Author of the publication

Anomaly based network intrusion detection for IoT attacks using deep learning technique.

, , , and . Comput. Electr. Eng., (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IETD: a novel image encryption technique using Tinkerbell map and Duffing map for IoT applications., , and . Multim. Tools Appl., 81 (30): 43189-43228 (2022)Low-Rate DDoS Attack on SDN Controller and Its Impact., , , and . SIN, page 1-6. IEEE, (2023)Implementing Key Management for Security in Ad Hoc Network., , , , and . HPAGC, volume 169 of Communications in Computer and Information Science, page 485-489. Springer, (2011)ScrapNet: An Efficient Approach to Trash Classification., , , , and . IEEE Access, (2021)IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata., , , , and . Multim. Tools Appl., 80 (21): 31529-31567 (2021)A Lightweight Cellular Automata Based Encryption Technique for IoT Applications., , and . IEEE Access, (2019)Quantum Computing: Exploring Superposition and Entanglement for Cutting-Edge Applications., , , , and . SIN, page 1-6. IEEE, (2023)Defending the Cloud: Understanding the Role of Explainable AI in Intrusion Detection Systems., , , , and . SIN, page 1-9. IEEE, (2023)IESCA: An efficient image encryption scheme using 2-D cellular automata., , , , and . J. Inf. Secur. Appl., (2021)IECA: an efficient IoT friendly image encryption technique using programmable cellular automata., , , and . J. Ambient Intell. Humaniz. Comput., 11 (11): 5083-5102 (2020)