Author of the publication

New sensing technique for detecting application layer DDoS attacks targeting back-end database resources.

, , and . ICC, page 1-7. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Based Malware Detection within Virtualised Environments., , , and . Euro-Par Workshops (1), volume 8805 of Lecture Notes in Computer Science, page 335-346. Springer, (2014)Adaptive Echo Cancellation for Packet-Based Networks., , and . ICT, volume 3124 of Lecture Notes in Computer Science, page 516-525. Springer, (2004)Enhancing Security and Privacy of Next-Generation Edge Computing Technologies., , and . PST, page 1-5. IEEE, (2019)N-opcode analysis for android malware classification and categorization., , , and . Cyber Security And Protection Of Digital Services, page 1-7. IEEE, (2016)Classification of P2P and HTTP Using Specific Protocol Characteristics., , and . EUNICE, volume 5733 of Lecture Notes in Computer Science, page 31-40. Springer, (2009)An investigation into the design of high-performance shared buffer architectures based on FPGA technology with embedded memory., and . FPT, page 461-464. IEEE, (2004)MaldomDetector: A system for detecting algorithmically generated domain names with machine learning., , , and . Comput. Secur., (2020)DL-Droid: Deep learning based android malware detection using real devices., , and . Comput. Secur., (2020)Policy-Based Profiles for Network Intrusion Response Systems., , and . CSR, page 279-286. IEEE, (2022)EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning., , and . IWSPA@CODASPY, page 65-72. ACM, (2017)