Research Title | MAG. TITLE | RESEARCH AREA | PUBLISH YEAR | DOI | Journal URL |
Anomaly Intrusion Detection using Machine Learning- IG-R Based on NSL-KDD Dataset | Bulletin of Electrical Engineering and Informatics | Cybersecurity | 2024 | |
Visit URL
|
Machine Learning Based Phishing Attacks Detection Using Multiple Datasets | International Journal of Interactive Mobile Technologies | Network Security | 2023 | |
Visit URL
|
Performance Evaluation of Machine Learning Approaches in Detecting IoT-Botnet Attacks | International Journal of Interactive Mobile Technologies (iJIM) | Network Security | 2023 | |
Visit URL
|
Simulation and analysis performance of ad-hoc routing protocols under DDoS attack and proposed solution | International Journal of Data and Network Science | Ad hoc networks DSR AODV OLSR Routing protocols Wireless Networks and DDoS | 2023 | |
Visit URL
|
Healthcare students’ mental and physical well-being during the COVID-19 lockdown and distance learning | Work | Computer Science | 2021 | |
Visit URL
|
Parallelism exploration in sequential algorithms via animation tool | Multiagent and Grid Systems | High Performance Computing and Machine Learning | 2021 | |
Visit URL
|
Parallel and fault-tolerant k-means clustering based on the actor model | Multiagent and Grid Systems | Parallel programming | 2020 | |
Visit URL
|
A Cryptosystem Based on Chaotic Maps and Factoring Problems | International Journal of Mathematics in Operational Research | Information Security | 2018 | |
Visit URL
|
Competitive Processors Allocation in 2D Mesh Connected Multicomputer NetworksA Dynamic Game Approach | International Journal of Grid and High Performance Computing | Computer Networks | 2017 | |
Visit URL
|
A New Technique for Data Encryption Based On Third Party Encryption Server (TPED) to Maintain the Privacy Preserving in the Cloud Environment | International Journal of Business Information Systems | Computer Networks | 2016 | |
Visit URL
|
Node verification to join the cloud Environment using Third Party Verification Server | International Journal of Interactive Mobile Technologies | Computer Networks | 2016 | |
Visit URL
|
A New Architecture Of Cloud Computing To Enhance The Load Balancing | International Journal of Business Information Systems | Computer Networks | 2015 | |
Visit URL
|
Power Aware Ant Colony Routing Algorithm for Mobile Ad-hoc Networks | International Journal of Software Engineering and Its Applications | Computer Networks | 2015 | |
Visit URL
|
A SURVEY ON OPERATING SYSTEM IDENTIFICATION BASED ON TCP/IP STACK | International Journal of Advancements in Computing Technology(IJACT) | Computer Networks | 2014 | |
Visit URL
|
Investigation Study on network scanning techniques | Journal of digital content technology and its applications | computer networks | 2012 | |
Visit URL
|