On internet traffic classification: A two-phased machine learning approach T Bakhshi, B Ghita Journal of Computer Networks and Communications 2016, 2016 | 106 | 2016 |
Assessing the global accessibility of the Internet CU Ngini, SM Furnell, BV Ghita Internet Research 12 (4), 329-338, 2002 | 72 | 2002 |
Novel trust consensus protocol and blockchain-based trust evaluation system for M2M application services B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles Internet of Things 7, 100058, 2019 | 65 | 2019 |
A novel online incremental learning intrusion prevention system C Constantinides, S Shiaeles, B Ghita, N Kolokotronis 2019 10th IFIP International Conference on New Technologies, Mobility and …, 2019 | 59 | 2019 |
Blockchain and trust for secure, end-user-based and decentralized IoT service provision B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles IEEE Access 8, 119961-119979, 2020 | 57 | 2020 |
MALGRA: Machine learning and N-gram malware feature extraction and detection system M Ali, S Shiaeles, G Bendiab, B Ghita Electronics 9 (11), 1777, 2020 | 54 | 2020 |
Improvements to inter system handover in the EPC environment S Frei, W Fuhrmann, A Rinkel, BV Ghita 2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011 | 43 | 2011 |
Wireless sensors for brain activity—a survey M TajDini, V Sokolov, I Kuzminykh, S Shiaeles, B Ghita Electronics 9 (12), 2092, 2020 | 42 | 2020 |
FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management G Bendiab, S Shiaeles, S Boucherkha, B Ghita computers & security 86, 270-290, 2019 | 38 | 2019 |
Information security risk assessment I Kuzminykh, B Ghita, V Sokolov, T Bakhshi Encyclopedia 1 (3), 602-617, 2021 | 37 | 2021 |
Malware squid: A novel iot malware traffic analysis framework using convolutional neural network and binary visualisation R Shire, S Shiaeles, K Bendiab, B Ghita, N Kolokotronis Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2019 | 35 | 2019 |
A new taxonomy for comparing intrusion detection systems CJ Tucker, SM Furnell, BV Ghita, PJ Brooke Internet Research 17 (1), 88-98, 2007 | 34 | 2007 |
Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric D Hock, M Kappes, B Ghita Sustainable Energy, Grids and Networks 21, 100290, 2020 | 31 | 2020 |
Detection of LDDoS attacks based on TCP connection parameters M Siracusano, S Shiaeles, B Ghita 2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2018 | 30 | 2018 |
Method for evaluating the bandwith of a digital link J Schmitt, D Le Foll, B Ghita US Patent App. 10/549,988, 2006 | 29 | 2006 |
User traffic profiling T Bakhshi, B Ghita 2015 Internet Technologies and Applications (ITA), 91-97, 2015 | 26 | 2015 |
User-centric traffic optimization in residential software defined networks T Bakhshi, B Ghita 2016 23rd International conference on telecommunications (ICT), 1-6, 2016 | 22 | 2016 |
Traffic profiling: Evaluating stability in multi-device user environments T Bakhshi, B Ghita 2016 30th International Conference on Advanced Information Networking and …, 2016 | 20 | 2016 |
P2P-based community concept for M2M Applications M Steinheimer, U Trick, W Fuhrmann, B Ghita Second International Conference on Future Generation Communication …, 2013 | 20 | 2013 |
Detection of insider threats using artificial intelligence and visualisation V Koutsouvelis, S Shiaeles, B Ghita, G Bendiab 2020 6th IEEE Conference on Network Softwarization (NetSoft), 437-443, 2020 | 19 | 2020 |