Author of the publication

A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN).

, , and . EAI Endorsed Trans. Security Safety, 4 (12): e2 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Planning and Operation for Renewable- Storage Under Different Financial Incentives and Market Mechanisms., , , and . IEEE Access, (2020)A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)., , and . EAI Endorsed Trans. Security Safety, 4 (12): e2 (2017)GNSSim: An Open Source GNSS/GPS Framework for Unmanned Aerial Vehicular Network Simulation., , , and . EAI Endorsed Trans. Mob. Commun. Appl., 2 (6): e2 (2015)Security Modeling of Autonomous Systems: A Survey., , , and . ACM Comput. Surv., 52 (5): 91:1-91:34 (2019)One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments., , , and . NDSS, The Internet Society, (2005)FPGA based key generation technique for anti-counterfeiting methods using Physically Unclonable Functions and artificial intelligence., , and . FPL, page 388-393. IEEE, (2012)Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems., , , , and . UEMCON, page 322-328. IEEE, (2019)Impact on SDN Powered Network Services Under Adversarial Attacks., , and . SCSE, volume 62 of Procedia Computer Science, page 228-235. Elsevier, (2015)An Improved H-Algorand Consensus Mechanism With Credibility Assessment Applying in EMR Storage System., , , , , and . IEEE Access, (2022)Dynamic State Estimation for Power System Based on the Measurement Data Reconstructed by RGAN., , and . IEEE Access, (2021)