Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Khondoker, Rahamatullah
add a person with the name Khondoker, Rahamatullah
 

Other publications of authors with the same name

Cybersecurity Attacks and Vulnerabilities During COVID-19., , , , and . AINA (3), volume 655 of Lecture Notes in Networks and Systems, page 532-545. Springer, (2023)A description language for communication services of future network architectures., , and . NOF, page 68-75. IEEE, (2011)Detecting and Mitigating Repaying Attack in Expressive Internet Architecture (XIA)., , , and . J. ICT Stand., 2 (2): 151-186 (2014)LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks., , , , , , and . AIIoT, page 753-759. IEEE, (2022)Security Analysis of Software Defined Networking Architectures: PCE, 4D and SANE., , , and . AINTEC, page 15. ACM, (2014)Requirement driven prospects for realizing user-centric network orchestration, , , , , , and . Multimedia tools and applications, 74 (2): 413--437 (2015)OrchSec: An orchestrator-based architecture for enhancing network-security using Network Monitoring and SDN Control functions., , , and . NOMS, page 1-9. IEEE, (2014)Cybersecurity Comparison of Brain-Based Automotive Electrical and Electronic Architectures., , , , , and . Inf., 13 (11): 518 (2022)A mutual key agreement protocol to mitigate replaying attack in eXpressive Internet Architecture (XIA)., , , and . Kaleidoscope, page 233-240. IEEE, (2014)Anomaly Classification to Enable Self-healing in Cyber Physical Systems Using Process Mining., , , , , and . LION, volume 14286 of Lecture Notes in Computer Science, page 1-15. Springer, (2023)