Author of the publication

An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things.

, , and . BDIOT, page 83-87. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks., , , and . IEEE Trans. Netw. Sci. Eng., 8 (4): 2968-2981 (2021)Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things., , and . IEEE Internet Things J., 6 (4): 7137-7151 (2019)Chatgpt for cybersecurity: practical applications, challenges, and future directions., , and . Clust. Comput., 26 (6): 3421-3436 (December 2023)Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms., , , and . J. Netw. Comput. Appl., (March 2024)An anomaly-based approach for DDoS attack detection in cloud environment., , and . Int. J. Comput. Appl. Technol., 57 (4): 312-324 (2018)Explainable deep learning for attack intelligence and combating cyber-physical attacks., and . Ad Hoc Networks, (February 2024)Developing a Security Testbed for Industrial Internet of Things., and . IEEE Internet Things J., 8 (7): 5558-5573 (2021)X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things., , and . IEEE Internet Things J., 9 (5): 3962-3977 (2022)A threat intelligence framework for protecting smart satellite-based healthcare networks., , and . Neural Comput. Appl., 36 (1): 15-35 (January 2024)Fake or Genuine? Contextualised Text Representation for Fake Review Detection., , , , and . CoRR, (2021)