Author of the publication

VoIP evidence model: A new forensic method for investigating VoIP malicious attacks.

, , and . CyberSec, page 201-206. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Issues and Challenges in Anomaly Intrusion Detection for HTTP Web Services., , , , and . J. Comput. Sci., 11 (11): 1041-1053 (2015)The Impact of Memory-Efficient Bots on IoT-WSN Botnet Propagation., , , and . Wirel. Pers. Commun., 119 (3): 2093-2105 (2021)Effective Dimensionality Reduction of Payload-Based Anomaly Detection in TMAD Model for HTTP Payload., , , and . KSII Trans. Internet Inf. Syst., 10 (8): 3884-3910 (2016)Mobile forensic data acquisition in Firefox OS., , , and . CyberSec, page 27-31. IEEE, (2014)An effective security alert mechanism for real-time phishing tweet detection on Twitter., , , , and . Comput. Secur., (2019)A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts., , , , , and . SpaCCS Workshops, volume 10067 of Lecture Notes in Computer Science, page 342-357. (2016)Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks., , , and . Int. J. Netw. Virtual Organisations, 19 (2/3/4): 153-175 (2018)An intelligent DDoS attack detection tree-based model using Gini index feature selection method., , , , and . Microprocess. Microsystems, (April 2023)An overview of attacks against digital watermarking and their respective countermeasures., , , and . CyberSec, page 265-270. IEEE, (2012)Structural features with nonnegative matrix factorization for metamorphic malware detection., , , and . Comput. Secur., (2021)