Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect DDoS attacks on cloud computing environment A Girma, M Garuba, J Li, C Liu 2015 12th International Conference on Information Technology-New Generations …, 2015 | 99 | 2015 |
IOT SECURITY AND THE ROLE OF AI/ML TO COMBAT EMERGING CYBER THREATS IN CLOUD COMPUTING ENVIRONMENT. TG Zewdie, A Girma Issues in Information Systems 21 (4), 2020 | 35 | 2020 |
Analysis of security vulnerability and analytics of Internet of Things (IOT) platform A Girma Information Technology-New Generations: 15th International Conference on …, 2018 | 26 | 2018 |
Research directions in quantum cryptography R Goel, M Garuba, A Girma Fourth International Conference on Information Technology (ITNG'07), 779-784, 2007 | 24 | 2007 |
Advanced machine language approach to detect DDoS attack using DBSCAN clustering technology with entropy A Girma, M Garuba, R Goel Information Technology-New Generations: 14th International Conference on …, 2018 | 23 | 2018 |
An evaluation framework for machine learning methods in detection of DoS and DDoS intrusion TG Zewdie, A Girma 2022 International conference on artificial intelligence in information and …, 2022 | 17 | 2022 |
Analysis of security vulnerabilities of cloud computing environment service models and its main characteristics A Girma, M Garuba, J Li 2015 12th International Conference on Information Technology-New Generations …, 2015 | 13 | 2015 |
Cloud computing vulnerability: DDoS as its main security threat, and analysis of IDS as a solution model R Goel, M Garuba, A Girma 2014 11th International Conference on Information Technology: New …, 2014 | 13 | 2014 |
Artificial intelligence techniques for sql injection attack detection J Irungu, S Graham, A Girma, T Kacem Proceedings of the 2023 8th International Conference on Intelligent …, 2023 | 11 | 2023 |
AN EFFICIENT HYBRID MODEL FOR DETECTING DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS IN CLOUD COMPUTING USING MULTIVARIATE CORRELATION AND DATA MINING CLUSTERING TECHNIQUES. A Girma, P Wang Issues in Information Systems 19 (2), 2018 | 7 | 2018 |
The Design, Data Flow Architecture, and Methodologies for a Newly Researched Comprehensive Hybrid Model for the Detection of DDoS Attacks on Cloud Computing Environment A Girma, K Abayomi, M Garuba Information Technology: New Generations: 13th International Conference on …, 2016 | 7 | 2016 |
Blockchain-based approach to thwart replay attacks targeting remote keyless entry systems IAR Djinko, T Kacem, A Girma 2022 International Conference on Engineering and Emerging Technologies …, 2022 | 3 | 2022 |
Identifying Shared Security Vulnerabilities and Mitigation Strategies at the Intersection of Application Programming Interfaces (APIs), Application-Level and Operating System … A Girma, MA Guo, J Irungu Proceedings of the Future Technologies Conference, 499-513, 2022 | 3 | 2022 |
Ransomware Attack Detection on the Internet of Things Using Machine Learning Algorithm TG Zewdie, A Girma, P Cotae International Conference on Human-Computer Interaction, 598-613, 2022 | 3 | 2022 |
Hypervisor Based IDS Solution Approach Using Hybrid Anomaly Detection Model in Cloud Computing Environment F Osamor, A Girma Proceedings of the Future Technologies Conference (FTC) 2020, Volume 3, 909-920, 2021 | 3 | 2021 |
Malware detection framework in cyber-physical systems using artificial intelligence-machine learning. TG Zewdie, A Girma, P Cotae Issues in Information Systems 23 (1), 2022 | 2 | 2022 |
Securing Software Defining Network from Emerging DDoS Attack TG Zewdie, A Girma International Conference on Human-Computer Interaction, 94-103, 2022 | 1 | 2022 |
Impact of external security measures on data access implementation with online database management system M Garuba, A Girma International Conference on Information Technology: Coding and Computing …, 2005 | 1 | 2005 |
Security Challenges and Solutions in 5G-Enabled IoT Networks A Girma, AP Barrett Proceedings of the Future Technologies Conference, 632-643, 2024 | | 2024 |
Reviewing the Effectiveness of Multi-factor Authentication (MFA) Methods in Preventing Phishing Attacks A Muir, K Brown, A Girma Proceedings of the Future Technologies Conference, 597-607, 2024 | | 2024 |