Volgen
Monowar Bhuyan
Monowar Bhuyan
Associate Professor of Computer Science, Umeå University, Sweden.
Geverifieerd e-mailadres voor cs.umu.se - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Network anomaly detection: methods, systems and tools
M Bhuyan, DK Bhattacharyya, JK Kalita
Ieee communications surveys & tutorials 16 (1), 303-336, 2013
16992013
Network attacks: Taxonomy, tools and systems
N Hoque, M Bhuyan, RC Baishya, DK Bhattacharyya, JK Kalita
Journal of Network and Computer Applications 40, 307-324, 2014
3542014
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
M Bhuyan, DK Bhattacharyya, JK Kalita
Pattern Recognition Letters 51, 1-7, 2015
2732015
Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions
M Bhuyan, HJ Kashyap, DK Bhattacharyya, JK Kalita
The Computer Journal 57 (4), 537-556, 2013
2562013
Surveying Port Scans and Their Detection Methodologies
M Bhuyan, DK Bhattacharyya, JK Kalita
The Computer Journal 54 (10), 1565-1581, 2011
2382011
Packet and Flow Based Network Intrusion Dataset
P Gogoi, M Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Contemporary Computing, 322-334, 2012
2012012
Towards Generating Real-life Datasets for Network Intrusion Detection
M Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Network Security 17 (6), 675-693, 2015
1802015
A multi-step outlier-based anomaly detection approach to network-wide traffic
M Bhuyan, DK Bhattacharyya, JK Kalita
Information Sciences 348, 243-271, 2016
1312016
Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools
M Bhuyan, DK Bhattacharyya, JK Kalita
842017
Survey on Incremental Approaches for Network Anomaly Detection
M Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Communication Networks and Information Security …, 2011
722011
An Effective Unsupervised Network Anomaly Detection Method
M Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Advances in Computing …, 2012
612012
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT
E Tsogbaatar, M Bhuyan, Y Taenaka, D Fall, K Gonchigsumlaa, E Elmroth, ...
Internet of Things 14, 100391, 2021
592021
E‐LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
M Bhuyan, DK Bhattacharyya, JK Kalita
Security and Communication Networks 9 (16), 3251-3270, 2016
572016
NADO: network anomaly detection using outlier approach
M Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Communication, Computing …, 2011
502011
AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach
M Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Network Security 14 (6), 339-351, 2012
422012
An effective method for fingerprint classification
M Bhuyan, S Saharia, DK Bhattacharyya
International Arab Journal of e-technology 1 (3), 89-97, 2010
412010
Hierarchical load balancing and clustering technique for home edge computing
CSM Babou, D Fall, S Kashihara, Y Taenaka, M Bhuyan, I Niang, ...
IEEE Access 8, 127593-127607, 2020
402020
SURE-H: A Secure IoT Enabled Smart Home System
R Sarmah, M Bhuyan, M Bhuyan
2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 59-63, 2019
402019
A survey on blockchain, SDN and NFV for the smart-home security
R Douha, M Bhuyan, S Kashihara, D Fall, Y Taenaka, Y Kadobayashi
Internet of Things, 100588, 2022
392022
Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation
M Bhuyan, A Kalwar, A Goswami, DK Bhattacharyya, JK Kalita
Fifth International Conference on Communication Systems and Network …, 2015
352015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20