Author of the publication

Counteracting Attacks From Malicious End Hosts in Software Defined Networks.

, and . IEEE Trans. Netw. Serv. Manag., 17 (1): 160-174 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Controller Agent Model to Counteract DoS Attacks in Multiple Domains., and . Integrated Network Management, volume 246 of IFIP Conference Proceedings, page 113-116. Kluwer, (2003)A hybrid model against TCP. SYN and reflection DDoS attacks., and . Comput. Syst. Sci. Eng., (2008)Analysis of traceback techniques., and . ACSW, volume 54 of CRPIT, page 115-124. Australian Computer Society, (2006)On the design of Virtual machine Intrusion detection system., and . Integrated Network Management, page 682-685. IEEE, (2011)Distributed service control technique for detecting security attacks., and . NOMS, page 574-577. IEEE, (2012)On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience., and . IEEE Trans. Cloud Computing, 5 (3): 375-389 (2017)Security as a Service Model for Cloud Environment., and . IEEE Trans. Network and Service Management, 11 (1): 60-75 (2014)Anti-phishing: A comprehensive perspective., , , , and . Expert Syst. Appl., 238 (Part F): 122199 (March 2024)Trust Enhanced Security for Tenant Transactions in the Cloud Environment., and . Comput. J., 58 (10): 2388-2403 (2015)A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection., , , and . IEEE Commun. Surv. Tutorials, 21 (1): 686-728 (2019)