Follow
Bogdan Ghita
Title
Cited by
Cited by
Year
On internet traffic classification: A two-phased machine learning approach
T Bakhshi, B Ghita
Journal of Computer Networks and Communications 2016, 2016
1052016
Assessing the global accessibility of the Internet
CU Ngini, SM Furnell, BV Ghita
Internet Research 12 (4), 329-338, 2002
722002
Novel trust consensus protocol and blockchain-based trust evaluation system for M2M application services
B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles
Internet of Things 7, 100058, 2019
642019
A novel online incremental learning intrusion prevention system
C Constantinides, S Shiaeles, B Ghita, N Kolokotronis
2019 10th IFIP International Conference on New Technologies, Mobility and …, 2019
582019
Blockchain and trust for secure, end-user-based and decentralized IoT service provision
B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles
IEEE Access 8, 119961-119979, 2020
542020
MALGRA: Machine learning and N-gram malware feature extraction and detection system
M Ali, S Shiaeles, G Bendiab, B Ghita
Electronics 9 (11), 1777, 2020
502020
Improvements to inter system handover in the EPC environment
S Frei, W Fuhrmann, A Rinkel, BV Ghita
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
432011
FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management
G Bendiab, S Shiaeles, S Boucherkha, B Ghita
computers & security 86, 270-290, 2019
382019
Wireless sensors for brain activity—a survey
M TajDini, V Sokolov, I Kuzminykh, S Shiaeles, B Ghita
Electronics 9 (12), 2092, 2020
362020
Information security risk assessment
I Kuzminykh, B Ghita, V Sokolov, T Bakhshi
Encyclopedia 1 (3), 602-617, 2021
352021
A new taxonomy for comparing intrusion detection systems
CJ Tucker, SM Furnell, BV Ghita, PJ Brooke
Internet Research 17 (1), 88-98, 2007
342007
Malware squid: A novel iot malware traffic analysis framework using convolutional neural network and binary visualisation
R Shire, S Shiaeles, K Bendiab, B Ghita, N Kolokotronis
Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2019
332019
Detection of LDDoS attacks based on TCP connection parameters
M Siracusano, S Shiaeles, B Ghita
2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2018
292018
Method for evaluating the bandwith of a digital link
J Schmitt, D Le Foll, B Ghita
US Patent App. 10/549,988, 2006
292006
Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric
D Hock, M Kappes, B Ghita
Sustainable Energy, Grids and Networks 21, 100290, 2020
282020
User traffic profiling
T Bakhshi, B Ghita
2015 Internet Technologies and Applications (ITA), 91-97, 2015
252015
User-centric traffic optimization in residential software defined networks
T Bakhshi, B Ghita
2016 23rd International conference on telecommunications (ICT), 1-6, 2016
222016
Traffic profiling: Evaluating stability in multi-device user environments
T Bakhshi, B Ghita
2016 30th International Conference on Advanced Information Networking and …, 2016
202016
P2P-based community concept for M2M Applications
M Steinheimer, U Trick, W Fuhrmann, B Ghita
Second International Conference on Future Generation Communication …, 2013
202013
Anomaly detection in encrypted internet traffic using hybrid deep learning
T Bakhshi, B Ghita
Security and Communication Networks 2021, 1-16, 2021
182021
The system can't perform the operation now. Try again later.
Articles 1–20