Author of the publication

A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems.

, , , , , and . Comput. Secur., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying 4-regular grid structures in large-scale access networks., , , and . Comput. Commun., 29 (9): 1350-1362 (2006)Using Google Earth for Visualization in FTTH Network Planning., , and . IP&C, volume 84 of Advances in Intelligent and Soft Computing, page 379-389. Springer, (2010)Diving Deep With BotLab-DS1: A Novel Ground Truth-Empowered Botnet Dataset., , , , , and . IEEE Access, (2024)On the use of machine learning for identifying botnet network traffic., and . J. Cyber Secur. Mobil., 4 (2-3): 1-32 (2015)A Methodology for Physical Interconnection Decisions of Next Generation Transport Networks., , , , and . J. Interconnect. Networks, 12 (1-2): 55-83 (2011)A method for identifying compromised clients based on DNS traffic analysis., , , and . Int. J. Inf. Sec., 16 (2): 115-132 (2017)Using latency as a QoS indicator for global cloud computing services., , , , , and . Concurr. Comput. Pract. Exp., 25 (18): 2488-2500 (2013)A Framework for Planning a Unified Wired and Wireless ICT Infrastructure., , , , and . Wirel. Pers. Commun., 54 (1): 169-185 (2010)An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records., , , and . CNS, page 164-172. IEEE, (2021)Converged Optical Network and Data Center Virtual Infrastructure Planning., , , and . JOCN, 4 (9): 681-691 (2012)