DDoS Detection in SDN using Machine Learning Techniques MW Nadeem, HG Goh, V Ponnusamy, Y Aun CMC-Computers, Materials & Continua 71 (https://www.techscience.com/cmc …, 2021 | 46 | 2021 |
Intrusion detection systems in internet of things and mobile Ad-Hoc networks. V Ponnusamy, M Humayun, NZ Jhanjhi, A Yichiet, MF Almufareh Computer Systems Science & Engineering 40 (3), 2022 | 32 | 2022 |
IoT wireless intrusion detection and network Traffic Analysis. V Ponnusamy, A Yichiet, NZ Jhanjhi, MF Almufareh Computer Systems Science & Engineering 40 (3), 2022 | 31 | 2022 |
Indoor positioning system: A review NHA Wahab, N Sunar, SHS Ariffin, KY Wong, Y Aun International Journal of Advanced Computer Science and Applications 13 (6), 2022 | 22 | 2022 |
A review on features' robustness in high diversity mobile traffic classifications Y Aun, S Manickam, S Karuppayah International journal of communication networks and information security 9 …, 2017 | 11 | 2017 |
Detecting and mitigating botnet attacks in software-defined networks using deep learning techniques MW Nadeem, HG Goh, Y Aun, V Ponnusamy IEEE Access, 2023 | 9 | 2023 |
A Recurrent Neural Network based Method for Low-Rate DDoS Attack Detection in SDN MW Nadeem, HG Goh, Y Aun, V Ponnusamy 2022 3rd International Conference on Artificial Intelligence and Data …, 2022 | 6 | 2022 |
Social engineering attack classifications on social media using deep learning Y Aun, ML Gan, N Wahab, GH Guan Comput. Mater. Contin 74 (3), 4917-4931, 2023 | 5 | 2023 |
A holistic IoT device classification approach through spatial & temporal behaviors modelling Y Aun, YM Khaw, ML Gan Telecommunication Systems 79 (4), 515-528, 2022 | 5 | 2022 |
Advances in cyber security M Anbar, N Abdullah, S Manickam Springer Singapore, 2020 | 5 | 2020 |
A Temporal-Aware Signature Extraction Method Using Sliding-Window Mechanism for Scalable, Cost-Effective and Accurate Traffic Classification A Yichiet, S Manickam, S Karrupayah ICCSCE2017 2017 (1), 6, 2017 | 4* | 2017 |
A semantic-aware log generation method for network activities A Yichiet, YMJ Khaw, ML Gan, V Ponnusamy International Journal of Information Security, 1-17, 2022 | 3 | 2022 |
International Conference on Mobile Computing and Sustainable Informatics: ICMCSI 2020 JS Raj Springer Nature, 2020 | 3 | 2020 |
Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A Review SA Wadho, AF Meghji, A Yichiet, R Kumar, FB Shaikh VAWKUM Transactions on Computer Sciences 11 (1), 295-305, 2023 | 2 | 2023 |
Group key Management in Resource Constraint Environment: Applications and Use Cases F Samiullah, S Akeylek, SL Gan, ML Aun International Journal of Advanced Natural Sciences and Engineering …, 2023 | 2 | 2023 |
Two-factor human authentication for mobile applications V Ponnusamy, K Rafique, LX Liang, A Yichiet, GM Lee International Conference on Mobile Computing and Sustainable Informatics …, 2021 | 2 | 2021 |
Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address Probing Y Aun, ML Gan, YMJ Khaw International Conference on Advances in Cyber Security, 274-288, 2019 | 2 | 2019 |
Behavior-based matchmaking system using player’s traits classification WH Chin, A Yichiet UTAR, 2018 | 2 | 2018 |
Dynamic assignment of Ipv6 addresses with embedded server role information for unified services and devices discovery Y Aun, S Ramadass TENCON 2014-2014 IEEE Region 10 Conference, 1-7, 2014 | 2 | 2014 |
Emerging Ransomware Attacks: Improvement and Remedies-A Systematic Literature Review SA Wadho, A Yichiet, ML Gan, LC Kang, R Akbar, R Kumar 2023 4th International Conference on Artificial Intelligence and Data …, 2023 | 1 | 2023 |