Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Satam, Pratik
add a person with the name Satam, Pratik
 

Other publications of authors with the same name

Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis., , , and . IEEE Trans. Information Forensics and Security, 10 (10): 2158-2170 (2015)CLaaS: Cybersecurity Lab as a Service - Design, Analysis, and Evaluation., , , , and . ICCAC, page 224-227. IEEE Computer Society, (2015)DNS-IDS: Securing DNS in the Cloud Era., , , and . ICCAC, page 296-301. IEEE Computer Society, (2015)Anomaly behavior analysis of website vulnerability and security., , and . AICCSA, page 1-7. IEEE Computer Society, (2016)Teaching and Training Cybersecurity as a Cloud Service., , , , , and . ICCAC, page 302-308. IEEE Computer Society, (2015)Cross Layer Anomaly Based Intrusion Detection System.. SASO Workshops, page 157-161. IEEE Computer Society, (2015)Secure and Resilient Cloud Services for Enhanced Living Environments., , , and . IEEE Cloud Computing, 3 (6): 44-52 (2016)Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data., , , and . AICCSA, page 1-7. IEEE Computer Society, (2018)Anomaly Behavior Analysis of DNS Protocol., , , and . J. Internet Serv. Inf. Secur., 5 (4): 85-97 (2015)Multi-Layer Mapping of Cyberspace for Intrusion Detection., , , , , , and . AICCSA, page 1-8. IEEE, (2021)