Author of the publication

A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks

, and . International Journal of Network Security & Its Applications, 8 (8): 1-18 (September 2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks, and . International Journal of Network Security & Its Applications, 8 (8): 1-18 (September 2016)A secure electronic medical record authorization system for smart device application in cloud computing environments., , , , and . Hum. centric Comput. Inf. Sci., (2020)A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps., , , , and . Soft Comput., 22 (8): 2495-2506 (2018)Securing Information Exchange in VANETs by Using Pairing-Based Cryptography., , , , and . Int. J. Found. Comput. Sci., 28 (6): 781-798 (2017)A secure payment system for multimedia on demand on mobile VANET clouds., , , and . Secur. Commun. Networks, 9 (17): 4378-4390 (2016)The design of a secure anonymous Internet voting system., , and . Comput. Secur., 23 (4): 330-337 (2004)Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET., , , and . Inf. Technol. Control., 42 (4): 369-379 (2013)A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services., , , and . Inf. Technol. Control., 45 (3): 289-299 (2016)A Secure Medical Data Exchange Protocol Based on Cloud Environment., , and . J. Medical Systems, 38 (9): 112 (2014)Robot Identification and Authentication in a Robot Cloud Service System., , , and . IEEE Access, (2018)