Author of the publication

Detection of Low-Rate Cloud DDoS Attacks in Frequency Domain Using Fast Hartley Transform.

, and . Wireless Personal Communications, 112 (3): 1735-1762 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated evolutionary neural network approach with distributed computing for congestion management., , and . Appl. Soft Comput., 10 (1): 251-260 (2010)Clustering Based on Trust of a Node in Mobile Ad-Hoc NETworks., , and . SSCC, volume 377 of Communications in Computer and Information Science, page 150-161. Springer, (2013)Enhanced Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing., , and . Informatica (Slovenia), 37 (2): 149-156 (2013)Detection of Low-Rate Cloud DDoS Attacks in Frequency Domain Using Fast Hartley Transform., and . Wireless Personal Communications, 112 (3): 1735-1762 (2020)Static/Dynamic Environmental Economic Dispatch Employing Chaotic Micro Bacterial Foraging Algorithm., , , and . SEMCCO (1), volume 7076 of Lecture Notes in Computer Science, page 585-592. Springer, (2011)A Lightweight Approach to Detect the Low/High Rate IP Spoofed Cloud DDoS Attacks., and . SC², page 118-123. IEEE Computer Society, (2017)Web content adaptation classification and summarization in mobile devices., , , , , and . Mobility Conference, page 380-385. ACM, (2007)Security Vulnerabilities of User Authentication Scheme Using Smart Card., , and . DBSec, volume 7371 of Lecture Notes in Computer Science, page 106-113. Springer, (2012)An improved bacterial foraging algorithm for combined static/dynamic environmental economic dispatch., , , and . Appl. Soft Comput., 12 (11): 3500-3513 (2012)On-line security monitoring and analysis using Levenberg-Marquardt algorithm-based Neural Network., , and . Int. J. Intell. Syst. Technol. Appl., 6 (1/2): 77-88 (2009)