Author of the publication

M-Sieve: A visualisation tool for supporting network security analysts: VAST 2012 Mini Challenge 1 award: "Subject matter expert's award".

, , , , , , , , , , , , and . IEEE VAST, page 265-266. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Lasebae, Aboubaker
add a person with the name Lasebae, Aboubaker
 

Other publications of authors with the same name

LOC algorithm: Location-aware opportunistic forwarding by using node's approximate location., , , , , , and . Int. J. Pervasive Computing and Communications, 10 (4): 481-496 (2014)On demand-based frequency allocation to mitigate interference in Femto-Macro LTE cellular network., , , and . FGCT, page 213-218. IEEE, (2013)Security analysis of the constrained application protocol in the Internet of Things., , and . FGCT, page 163-168. IEEE, (2013)Intrusion Detection and Classification with Autoencoded Deep Neural Network., , , and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 142-156. Springer, (2018)Implementing Fingerprint Recognition on One-Time Password Device to Enhance User Authentication., , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 448-461. Springer, (2019)A Secure Framework for Communications in Heterogeneous Networks., , , and . AINA Workshops, page 841-846. IEEE Computer Society, (2014)Instant Channel Allocation Technique to Improve System Throughput in Joint LTE Cellular Network., , , and . AINA Workshops, page 900-904. IEEE Computer Society, (2014)A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR., , , , and . EURASIP J. Wireless Comm. and Networking, (2012)Comparison between resource reservation protocol and next steps in signalling in mobile IP networks., , and . IET Networks, 4 (2): 83-92 (2015)Providing Security in 4G Systems: Unveiling the Challenges., , , and . AICT, page 439-444. IEEE Computer Society, (2010)