Author of the publication

Network Attack Detection and Mitigation.

, and . SASO Workshops, page 168-173. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed star coloring of network for IP traceback., and . Int. J. Inf. Sec., 17 (3): 315-326 (2018)Fuzzy Logic and Log-Sigmoid Function Based Vision Enhancement of Hazy Images., , and . IntelliSys (1), volume 868 of Advances in Intelligent Systems and Computing, page 447-462. Springer, (2018)An Analysis of Hybrid Consensus in Blockchain Protocols for Correctness and Progress., and . DBSec, volume 13942 of Lecture Notes in Computer Science, page 404-412. Springer, (2023)A novel approach to format based text steganography., and . ICCCS, page 511-516. ACM, (2011)A network based vulnerability scanner for detecting SQLI attacks in web applications., and . RAIT, page 585-590. IEEE, (2012)Efficient Copy-Move Forgery Detection using Blur and Rotation Invariant Technique., , and . ICNCC, page 123-127. ACM, (2018)Network Attack Detection and Mitigation., and . SASO Workshops, page 168-173. IEEE Computer Society, (2015)Adaptive Fluorescence Pixels Control in Visibility Refinement through CSA., and . IPTA, page 1-4. IEEE, (2019)IP Traceback in Dynamic Networks., , and . ISEA-ISAP, volume 939 of Communications in Computer and Information Science, page 153-165. Springer, (2018)Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization., , , and . CCSEIT, page 372-376. ACM, (2012)