关注
Henock Mulugeta Melaku
Henock Mulugeta Melaku
Assistant Professor of Computer Engineering
在 aait.edu.et 的电子邮件经过验证
标题
引用次数
引用次数
年份
Review of botnet attack detection in SDN-enabled IoT Using machine learning
WG Negera, F Schwenker, TG Debelee, HM Melaku, YM Ayano
Sensors 22 (24), 9837, 2022
162022
Efficient intrusion detection system for SDN orchestrated Internet of Things
EM Zeleke, HM Melaku, FG Mengistu
Journal of Computer Networks and Communications 2021 (1), 5593214, 2021
152021
A dynamic and adaptive cybersecurity governance framework
HM Melaku
Journal of Cybersecurity and Privacy 3 (3), 327-350, 2023
122023
Context-based and adaptive cybersecurity risk management framework
HM Melaku
Risks 11 (6), 101, 2023
92023
Performance of TCP variants over proactive and reactive routing protocols in MANET
H Mulugeta, K Raimond
Proceedings of the International Conference on Management of Emergent …, 2012
72012
Lightweight Model for Botnet Attack Detection in Software Defined Network-Orchestrated IoT
WG Negera, F Schwenker, TG Debelee, HM Melaku, DW Feyisa
Applied Sciences 13 (8), 4699, 2023
62023
Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET
HM Melaku, DH Woldegebreal, K Raimond
International Journal of Computer Applications in Technology 51 (3), 235-246, 2015
42015
Performance improvement of tcp using tcp-door-ts algorithm in mobile ad hoc networks
H Mulugeta, K Raimond
2011 IEEE 13th International Conference on Communication Technology, 642-646, 2011
42011
Investigating Potential Vulnerability of Critical Infrastructure and way forward–recommendations to enhance security and resilience
HM Melaku
32022
Drift Adaptive Online DDoS Attack Detection Framework for IoT System
YK Beshah, SL Abebe, HM Melaku
Electronics 13 (6), 1004, 2024
12024
Lightweight Pattern Matching Method for DNA Sequencing in Internet of Medical Things
JAM Rexie, K Raimond, M Murugaaboopathy, D Brindha, H Mulugeta
Computational Intelligence and Neuroscience 2022 (1), 6980335, 2022
12022
An Optimized and Energy‐Efficient Ad‐Hoc On‐Demand Distance Vector Routing Protocol Based on Dynamic Forwarding Probability (AODVI)
H Gizachew Yirga, G Desalegn Taye, H Mulugeta Melaku
Journal of Computer Networks and Communications 2022 (1), 5750767, 2022
12022
A hybrid behavioural-based cyber intrusion detection system
A Adhanom, HM Melaku
International Journal of Communication Networks and Distributed Systems 23 …, 2019
12019
TCP-PLDR: A Novel Packet Loss Detection and Response Mechanism for TCP in Mobile Ad Hoc Networks.
HM Melaku, K Raimond, DH Woldegebreal
Ad Hoc Sens. Wirel. Networks 28 (3-4), 183-202, 2015
12015
Hierarchical Classification of Botnet Using Lightweight CNN
WG Negera, F Schwenker, DW Feyisa, TG Debelee, HM Melaku
Applied Sciences 14 (10), 3966, 2024
2024
SELECTING FITTING MACHINE LEARNING METHODS TO CONSTRUCT A HYBRID CYBER THREAT INTELLIGENCE MODEL
AT Haile, S Lemma, H Mulugeta
Journal of Data Acquisition and Processing 38 (3), 6603, 2023
2023
Biomedical Science and Clinical Research
HM Melaku
Biomed Sci 2 (1), 61, 2023
2023
Research Article An Optimized and Energy-Efficient Ad-Hoc On-Demand Distance Vector Routing Protocol Based on Dynamic Forwarding Probability (AODVI)
HG Yirga, GD Taye, HM Melaku
2022
On this page
JAM Rexie, K Raimond, M Murugaaboopathy, D Brindha, H Mulugeta
Computational Intelligence and Neuroscience 2, 3, 2022
2022
Design and Implementation of Authentication Algorithm for Medical Internet of Things using a Combination of Cryptography and Steganography
W Engdew
2020
系统目前无法执行此操作,请稍后再试。
文章 1–20