Network anomaly detection: methods, systems and tools MH Bhuyan, DK Bhattacharyya, JK Kalita Ieee communications surveys & tutorials 16 (1), 303-336, 2013 | 1442 | 2013 |
Network attacks: Taxonomy, tools and systems N Hoque, MH Bhuyan, RC Baishya, DK Bhattacharyya, JK Kalita Journal of Network and Computer Applications 40, 307-324, 2014 | 309 | 2014 |
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection MH Bhuyan, DK Bhattacharyya, JK Kalita Pattern Recognition Letters 51, 1-7, 2015 | 252 | 2015 |
Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions MH Bhuyan, HJ Kashyap, DK Bhattacharyya, JK Kalita The Computer Journal 57 (4), 537-556, 2013 | 227 | 2013 |
Surveying Port Scans and Their Detection Methodologies MH Bhuyan, DK Bhattacharyya, JK Kalita The Computer Journal 54 (10), 1565-1581, 2011 | 209 | 2011 |
Packet and Flow Based Network Intrusion Dataset P Gogoi, MH Bhuyan, DK Bhattacharyya, JK Kalita Proceedings of the International Conference on Contemporary Computing, 322-334, 2012 | 176 | 2012 |
Towards Generating Real-life Datasets for Network Intrusion Detection MH Bhuyan, DK Bhattacharyya, JK Kalita International Journal of Network Security 17 (6), 675-693, 2015 | 147 | 2015 |
A multi-step outlier-based anomaly detection approach to network-wide traffic MH Bhuyan, DK Bhattacharyya, JK Kalita Information Sciences 348, 243-271, 2016 | 113 | 2016 |
Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools MH Bhuyan, DK Bhattacharyya, JK Kalita | 66 | 2017 |
Survey on Incremental Approaches for Network Anomaly Detection MH Bhuyan, DK Bhattacharyya, JK Kalita International Journal of Communication Networks and Information Security …, 2011 | 65 | 2011 |
E‐LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric MH Bhuyan, DK Bhattacharyya, JK Kalita Security and Communication Networks 9 (16), 3251-3270, 2016 | 54 | 2016 |
An Effective Unsupervised Network Anomaly Detection Method MH Bhuyan, DK Bhattacharyya, JK Kalita Proceedings of the International Conference on Advances in Computing …, 2012 | 53 | 2012 |
NADO: network anomaly detection using outlier approach MH Bhuyan, DK Bhattacharyya, JK Kalita Proceedings of the International Conference on Communication, Computing …, 2011 | 48 | 2011 |
AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach MH Bhuyan, DK Bhattacharyya, JK Kalita International Journal of Network Security 14 (6), 339-351, 2012 | 39 | 2012 |
An effective method for fingerprint classification MH Bhuyan, S Saharia, DK Bhattacharyya International Arab Journal of e-technology 1 (3), 89-97, 2010 | 39 | 2010 |
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT E Tsogbaatar, MH Bhuyan, Y Taenaka, D Fall, K Gonchigsumlaa, ... Internet of Things 14, 100391, 2021 | 32 | 2021 |
Information metrics for low-rate DDoS attack detection: A comparative evaluation MH Bhuyan, DK Bhattacharyya, JK Kalita Seventh International Conference on Contemporary Computing (IC3), 80-84, 2014 | 31 | 2014 |
SURE-H: A Secure IoT Enabled Smart Home System R Sarmah, M Bhuyan, MH Bhuyan 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 59-63, 2019 | 27 | 2019 |
Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation MH Bhuyan, A Kalwar, A Goswami, DK Bhattacharyya, JK Kalita Fifth International Conference on Communication Systems and Network …, 2015 | 26 | 2015 |
Hierarchical load balancing and clustering technique for home edge computing CSM Babou, D Fall, S Kashihara, Y Taenaka, MH Bhuyan, I Niang, ... IEEE Access 8, 127593-127607, 2020 | 23 | 2020 |