עקוב אחר
Bogdan Ghita
Bogdan Ghita
כתובת אימייל מאומתת בדומיין plymouth.ac.uk - דף הבית
כותרת
צוטט על ידי
צוטט על ידי
שנה
On internet traffic classification: a two‐phased machine learning approach
T Bakhshi, B Ghita
Journal of Computer Networks and Communications 2016 (1), 2048302, 2016
1102016
MALGRA: Machine learning and N-gram malware feature extraction and detection system
M Ali, S Shiaeles, G Bendiab, B Ghita
Electronics 9 (11), 1777, 2020
732020
A novel online incremental learning intrusion prevention system
C Constantinides, S Shiaeles, B Ghita, N Kolokotronis
2019 10th IFIP International conference on new technologies, mobility and …, 2019
732019
Assessing the global accessibility of the Internet
CU Ngini, SM Furnell, BV Ghita
Internet Research 12 (4), 329-338, 2002
732002
Blockchain and trust for secure, end-user-based and decentralized IoT service provision
B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles
IEEe Access 8, 119961-119979, 2020
712020
Novel trust consensus protocol and blockchain-based trust evaluation system for M2M application services
B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles
Internet of Things 7, 100058, 2019
692019
Information security risk assessment
I Kuzminykh, B Ghita, V Sokolov, T Bakhshi
Encyclopedia 1 (3), 602-617, 2021
562021
Wireless sensors for brain activity—A survey
M TajDini, V Sokolov, I Kuzminykh, S Shiaeles, B Ghita
Electronics 9 (12), 2092, 2020
522020
Malware squid: A novel iot malware traffic analysis framework using convolutional neural network and binary visualisation
R Shire, S Shiaeles, K Bendiab, B Ghita, N Kolokotronis
Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2019
452019
Improvements to inter system handover in the EPC environment
S Frei, W Fuhrmann, A Rinkel, BV Ghita
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
432011
FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management
G Bendiab, S Shiaeles, S Boucherkha, B Ghita
computers & security 86, 270-290, 2019
412019
Detection of LDDoS attacks based on TCP connection parameters
M Siracusano, S Shiaeles, B Ghita
2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2018
342018
A new taxonomy for comparing intrusion detection systems
CJ Tucker, SM Furnell, BV Ghita, PJ Brooke
Internet Research 17 (1), 88-98, 2007
342007
Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric
D Hock, M Kappes, B Ghita
Sustainable Energy, Grids and Networks 21, 100290, 2020
322020
Anomaly detection in encrypted internet traffic using hybrid deep learning
T Bakhshi, B Ghita
Security and Communication Networks 2021 (1), 5363750, 2021
312021
User traffic profiling
T Bakhshi, B Ghita
2015 Internet Technologies and Applications (ITA), 91-97, 2015
312015
Method for evaluating the bandwith of a digital link
J Schmitt, D Le Foll, B Ghita
US Patent App. 10/549,988, 2006
312006
A blockchain secured pharmaceutical distribution system to fight counterfeiting
K Zoughalian, J Marchang, B Ghita
International Journal of Environmental Research and Public Health 19 (7), 4091, 2022
272022
Detection of insider threats using artificial intelligence and visualisation
V Koutsouvelis, S Shiaeles, B Ghita, G Bendiab
2020 6th IEEE Conference on Network Softwarization (NetSoft), 437-443, 2020
272020
A review of IoT firmware vulnerabilities and auditing techniques
T Bakhshi, B Ghita, I Kuzminykh
Sensors 24 (2), 708, 2024
242024
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20