Review of botnet attack detection in SDN-enabled IoT Using machine learning WG Negera, F Schwenker, TG Debelee, HM Melaku, YM Ayano Sensors 22 (24), 9837, 2022 | 16 | 2022 |
Efficient intrusion detection system for SDN orchestrated Internet of Things EM Zeleke, HM Melaku, FG Mengistu Journal of Computer Networks and Communications 2021 (1), 5593214, 2021 | 15 | 2021 |
A dynamic and adaptive cybersecurity governance framework HM Melaku Journal of Cybersecurity and Privacy 3 (3), 327-350, 2023 | 12 | 2023 |
Context-based and adaptive cybersecurity risk management framework HM Melaku Risks 11 (6), 101, 2023 | 9 | 2023 |
Performance of TCP variants over proactive and reactive routing protocols in MANET H Mulugeta, K Raimond Proceedings of the International Conference on Management of Emergent …, 2012 | 7 | 2012 |
Lightweight Model for Botnet Attack Detection in Software Defined Network-Orchestrated IoT WG Negera, F Schwenker, TG Debelee, HM Melaku, DW Feyisa Applied Sciences 13 (8), 4699, 2023 | 6 | 2023 |
Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET HM Melaku, DH Woldegebreal, K Raimond International Journal of Computer Applications in Technology 51 (3), 235-246, 2015 | 4 | 2015 |
Performance improvement of tcp using tcp-door-ts algorithm in mobile ad hoc networks H Mulugeta, K Raimond 2011 IEEE 13th International Conference on Communication Technology, 642-646, 2011 | 4 | 2011 |
Investigating Potential Vulnerability of Critical Infrastructure and way forward–recommendations to enhance security and resilience HM Melaku | 3 | 2022 |
Drift Adaptive Online DDoS Attack Detection Framework for IoT System YK Beshah, SL Abebe, HM Melaku Electronics 13 (6), 1004, 2024 | 1 | 2024 |
Lightweight Pattern Matching Method for DNA Sequencing in Internet of Medical Things JAM Rexie, K Raimond, M Murugaaboopathy, D Brindha, H Mulugeta Computational Intelligence and Neuroscience 2022 (1), 6980335, 2022 | 1 | 2022 |
An Optimized and Energy‐Efficient Ad‐Hoc On‐Demand Distance Vector Routing Protocol Based on Dynamic Forwarding Probability (AODVI) H Gizachew Yirga, G Desalegn Taye, H Mulugeta Melaku Journal of Computer Networks and Communications 2022 (1), 5750767, 2022 | 1 | 2022 |
A hybrid behavioural-based cyber intrusion detection system A Adhanom, HM Melaku International Journal of Communication Networks and Distributed Systems 23 …, 2019 | 1 | 2019 |
TCP-PLDR: A Novel Packet Loss Detection and Response Mechanism for TCP in Mobile Ad Hoc Networks. HM Melaku, K Raimond, DH Woldegebreal Ad Hoc Sens. Wirel. Networks 28 (3-4), 183-202, 2015 | 1 | 2015 |
Hierarchical Classification of Botnet Using Lightweight CNN WG Negera, F Schwenker, DW Feyisa, TG Debelee, HM Melaku Applied Sciences 14 (10), 3966, 2024 | | 2024 |
SELECTING FITTING MACHINE LEARNING METHODS TO CONSTRUCT A HYBRID CYBER THREAT INTELLIGENCE MODEL AT Haile, S Lemma, H Mulugeta Journal of Data Acquisition and Processing 38 (3), 6603, 2023 | | 2023 |
Biomedical Science and Clinical Research HM Melaku Biomed Sci 2 (1), 61, 2023 | | 2023 |
Research Article An Optimized and Energy-Efficient Ad-Hoc On-Demand Distance Vector Routing Protocol Based on Dynamic Forwarding Probability (AODVI) HG Yirga, GD Taye, HM Melaku | | 2022 |
On this page JAM Rexie, K Raimond, M Murugaaboopathy, D Brindha, H Mulugeta Computational Intelligence and Neuroscience 2, 3, 2022 | | 2022 |
Design and Implementation of Authentication Algorithm for Medical Internet of Things using a Combination of Cryptography and Steganography W Engdew | | 2020 |