关注
Monowar Bhuyan
Monowar Bhuyan
Assistant Professor of Computer Science, Umeå University, Sweden.
在 cs.umu.se 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Network anomaly detection: methods, systems and tools
MH Bhuyan, DK Bhattacharyya, JK Kalita
Ieee communications surveys & tutorials 16 (1), 303-336, 2013
14422013
Network attacks: Taxonomy, tools and systems
N Hoque, MH Bhuyan, RC Baishya, DK Bhattacharyya, JK Kalita
Journal of Network and Computer Applications 40, 307-324, 2014
3092014
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
Pattern Recognition Letters 51, 1-7, 2015
2522015
Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions
MH Bhuyan, HJ Kashyap, DK Bhattacharyya, JK Kalita
The Computer Journal 57 (4), 537-556, 2013
2272013
Surveying Port Scans and Their Detection Methodologies
MH Bhuyan, DK Bhattacharyya, JK Kalita
The Computer Journal 54 (10), 1565-1581, 2011
2092011
Packet and Flow Based Network Intrusion Dataset
P Gogoi, MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Contemporary Computing, 322-334, 2012
1762012
Towards Generating Real-life Datasets for Network Intrusion Detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Network Security 17 (6), 675-693, 2015
1472015
A multi-step outlier-based anomaly detection approach to network-wide traffic
MH Bhuyan, DK Bhattacharyya, JK Kalita
Information Sciences 348, 243-271, 2016
1132016
Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools
MH Bhuyan, DK Bhattacharyya, JK Kalita
662017
Survey on Incremental Approaches for Network Anomaly Detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Communication Networks and Information Security …, 2011
652011
E‐LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
MH Bhuyan, DK Bhattacharyya, JK Kalita
Security and Communication Networks 9 (16), 3251-3270, 2016
542016
An Effective Unsupervised Network Anomaly Detection Method
MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Advances in Computing …, 2012
532012
NADO: network anomaly detection using outlier approach
MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Communication, Computing …, 2011
482011
AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Network Security 14 (6), 339-351, 2012
392012
An effective method for fingerprint classification
MH Bhuyan, S Saharia, DK Bhattacharyya
International Arab Journal of e-technology 1 (3), 89-97, 2010
392010
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT
E Tsogbaatar, MH Bhuyan, Y Taenaka, D Fall, K Gonchigsumlaa, ...
Internet of Things 14, 100391, 2021
322021
Information metrics for low-rate DDoS attack detection: A comparative evaluation
MH Bhuyan, DK Bhattacharyya, JK Kalita
Seventh International Conference on Contemporary Computing (IC3), 80-84, 2014
312014
SURE-H: A Secure IoT Enabled Smart Home System
R Sarmah, M Bhuyan, MH Bhuyan
2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 59-63, 2019
272019
Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation
MH Bhuyan, A Kalwar, A Goswami, DK Bhattacharyya, JK Kalita
Fifth International Conference on Communication Systems and Network …, 2015
262015
Hierarchical load balancing and clustering technique for home edge computing
CSM Babou, D Fall, S Kashihara, Y Taenaka, MH Bhuyan, I Niang, ...
IEEE Access 8, 127593-127607, 2020
232020
系统目前无法执行此操作,请稍后再试。
文章 1–20