Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks., , , , , , and . Concurrency and Computation: Practice and Experience, (2018)Security Strength Indicator in Fallback Authentication: Nudging Users for Better Answers in Secret Questions., , and . CoRR, (2017)Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment, , and . CoRR, (2013)Distributed Denial of Service Prevention Techniques, , and . CoRR, (2012)Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions., , , , and . Annales des Télécommunications, 72 (9-10): 513-515 (2017)Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email, , , , and . CoRR, (2013)An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach, , and . CoRR, (2012)Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network, , and . CoRR, (2012)Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches., and . IJESMA, 11 (2): 1-21 (2019)An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment., , and . Cluster Computing, 22 (Suppl 1): 1639-1653 (2019)