DDoS Detection in SDN using Machine Learning Techniques MW Nadeem, HG Goh, V Ponnusamy, Y Aun CMC-Computers, Materials & Continua 71 (https://www.techscience.com/cmc …, 2021 | 70 | 2021 |
Intrusion detection systems in internet of things and mobile Ad-Hoc networks. V Ponnusamy, M Humayun, NZ Jhanjhi, A Yichiet, MF Almufareh Computer Systems Science & Engineering 40 (3), 2022 | 43 | 2022 |
Indoor positioning system: A review NHA Wahab, N Sunar, SHS Ariffin, KY Wong, Y Aun International Journal of Advanced Computer Science and Applications 13 (6), 2022 | 41 | 2022 |
IoT wireless intrusion detection and network Traffic Analysis. V Ponnusamy, A Yichiet, NZ Jhanjhi, MF Almufareh Computer Systems Science & Engineering 40 (3), 2022 | 38 | 2022 |
Detecting and mitigating botnet attacks in software-defined networks using deep learning techniques MW Nadeem, HG Goh, Y Aun, V Ponnusamy IEEE Access 11, 49153-49171, 2023 | 23 | 2023 |
A recurrent neural network based method for low-rate DDoS attack detection in SDN MW Nadeem, HG Goh, Y Aun, V Ponnusamy 2022 3rd International Conference on Artificial Intelligence and Data …, 2022 | 12 | 2022 |
Social engineering attack classifications on social media using deep learning Y Aun, ML Gan, N Wahab, GH Guan Comput. Mater. Contin 74 (3), 4917-4931, 2023 | 10 | 2023 |
A review on features' robustness in high diversity mobile traffic classifications Y Aun, S Manickam, S Karuppayah International journal of communication networks and information security 9 …, 2017 | 10 | 2017 |
Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing S Ali, SA Wadho, A Yichiet, ML Gan, CK Lee Egyptian Informatics Journal 27, 100519, 2024 | 8 | 2024 |
Group key management in internet of things: A systematic literature review F Samiullah, ML Gan, S Akleylek, Y Aun IEEE Access, 2023 | 8 | 2023 |
A holistic IoT device classification approach through spatial & temporal behaviors modelling Y Aun, YM Khaw, ML Gan Telecommunication Systems 79 (4), 515-528, 2022 | 6 | 2022 |
Indoor Positioning System: A Review J NSC, NHA Wahab, N Sunar, SHS Ariffin, KY Wong, Y Aun International Journal of Advanced Computer Science and Applications 13 (6), 2022 | 6 | 2022 |
Advances in cyber security M Anbar, N Abdullah, S Manickam Springer Singapore, 2020 | 6 | 2020 |
Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A Review SA Wadho, AF Meghji, A Yichiet, R Kumar, FB Shaikh VAWKUM Transactions on Computer Sciences 11 (1), 295-305, 2023 | 5 | 2023 |
A Machine-Learning Ensemble Method for Temporal-aware Sales Forecasting Y Aun, YMJ Khaw, ML Gan, DLH Chern 2022 5th International Conference on Data Science and Information Technology …, 2022 | 5 | 2022 |
A Temporal-Aware Signature Extraction Method Using Sliding-Window Mechanism for Scalable, Cost-Effective and Accurate Traffic Classification A Yichiet, S Manickam, S Karrupayah ICCSCE2017 2017 (1), 6, 2017 | 5* | 2017 |
Emerging Ransomware Attacks: Improvement and Remedies-A Systematic Literature Review SA Wadho, A Yichiet, ML Gan, LC Kang, R Akbar, R Kumar 2023 4th International Conference on Artificial Intelligence and Data …, 2023 | 4 | 2023 |
Group key Management in Resource Constraint Environment: Applications and Use Cases F Samiullah, S Akeylek, SL Gan, ML Aun International Journal of Advanced Natural Sciences and Engineering …, 2023 | 3 | 2023 |
A semantic-aware log generation method for network activities A Yichiet, YMJ Khaw, ML Gan, V Ponnusamy International Journal of Information Security, 1-17, 2022 | 3 | 2022 |
Intent-based network policy to solution architecting recommendations A Yichiet, JKY Min, GM Lee, LJ Sheng International Journal of Business Data Communications and Networking (IJBDCN …, 2021 | 3 | 2021 |