Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges., and . Cybersecur., 4 (1): 18 (2021)Survey of intrusion detection systems: techniques, datasets and challenges., , , and . Cybersecur., 2 (1): 20 (2019)Detection of Obfuscated Malicious JavaScript Code., , , and . Future Internet, 14 (8): 217 (2022)Malware Detection and Prevention System Based on Multi-Stage Rules., , , and . Int. J. Inf. Secur. Priv., 7 (2): 29-43 (2013)Smart Contract-Based Access Control Framework for Internet of Things Devices., , , , , , , , and . Comput., 12 (11): 240 (October 2023)Using response action with intelligent intrusion detection and prevention system against web application malware., , , , and . Inf. Manag. Comput. Secur., 22 (5): 431-449 (2014)Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware., , , and . SecNet, volume 381 of Communications in Computer and Information Science, page 177-184. Springer, (2013)An Anomaly Intrusion Detection System Using C5 Decision Tree Classifier., , and . PAKDD (Workshops), volume 11154 of Lecture Notes in Computer Science, page 149-155. Springer, (2018)Crime Toolkits: The Productisation of Cybercrime., , , , and . TrustCom/ISPA/IUCC, page 1626-1632. IEEE Computer Society, (2013)