Следене
Aun Yichiet
Aun Yichiet
Assistant Professor in Communication Technology, Universiti Tunku Abdul Rahman
Потвърден имейл адрес: utar.edu.my - Начална страница
Заглавие
Позовавания
Позовавания
Година
DDoS Detection in SDN using Machine Learning Techniques
MW Nadeem, HG Goh, V Ponnusamy, Y Aun
CMC-Computers, Materials & Continua 71 (https://www.techscience.com/cmc …, 2021
462021
Intrusion detection systems in internet of things and mobile Ad-Hoc networks.
V Ponnusamy, M Humayun, NZ Jhanjhi, A Yichiet, MF Almufareh
Computer Systems Science & Engineering 40 (3), 2022
322022
IoT wireless intrusion detection and network Traffic Analysis.
V Ponnusamy, A Yichiet, NZ Jhanjhi, MF Almufareh
Computer Systems Science & Engineering 40 (3), 2022
312022
Indoor positioning system: A review
NHA Wahab, N Sunar, SHS Ariffin, KY Wong, Y Aun
International Journal of Advanced Computer Science and Applications 13 (6), 2022
222022
A review on features' robustness in high diversity mobile traffic classifications
Y Aun, S Manickam, S Karuppayah
International journal of communication networks and information security 9 …, 2017
112017
Detecting and mitigating botnet attacks in software-defined networks using deep learning techniques
MW Nadeem, HG Goh, Y Aun, V Ponnusamy
IEEE Access, 2023
92023
A Recurrent Neural Network based Method for Low-Rate DDoS Attack Detection in SDN
MW Nadeem, HG Goh, Y Aun, V Ponnusamy
2022 3rd International Conference on Artificial Intelligence and Data …, 2022
62022
Social engineering attack classifications on social media using deep learning
Y Aun, ML Gan, N Wahab, GH Guan
Comput. Mater. Contin 74 (3), 4917-4931, 2023
52023
A holistic IoT device classification approach through spatial & temporal behaviors modelling
Y Aun, YM Khaw, ML Gan
Telecommunication Systems 79 (4), 515-528, 2022
52022
Advances in cyber security
M Anbar, N Abdullah, S Manickam
Springer Singapore, 2020
52020
A Temporal-Aware Signature Extraction Method Using Sliding-Window Mechanism for Scalable, Cost-Effective and Accurate Traffic Classification
A Yichiet, S Manickam, S Karrupayah
ICCSCE2017 2017 (1), 6, 2017
4*2017
A semantic-aware log generation method for network activities
A Yichiet, YMJ Khaw, ML Gan, V Ponnusamy
International Journal of Information Security, 1-17, 2022
32022
International Conference on Mobile Computing and Sustainable Informatics: ICMCSI 2020
JS Raj
Springer Nature, 2020
32020
Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A Review
SA Wadho, AF Meghji, A Yichiet, R Kumar, FB Shaikh
VAWKUM Transactions on Computer Sciences 11 (1), 295-305, 2023
22023
Group key Management in Resource Constraint Environment: Applications and Use Cases
F Samiullah, S Akeylek, SL Gan, ML Aun
International Journal of Advanced Natural Sciences and Engineering …, 2023
22023
Two-factor human authentication for mobile applications
V Ponnusamy, K Rafique, LX Liang, A Yichiet, GM Lee
International Conference on Mobile Computing and Sustainable Informatics …, 2021
22021
Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address Probing
Y Aun, ML Gan, YMJ Khaw
International Conference on Advances in Cyber Security, 274-288, 2019
22019
Behavior-based matchmaking system using player’s traits classification
WH Chin, A Yichiet
UTAR, 2018
22018
Dynamic assignment of Ipv6 addresses with embedded server role information for unified services and devices discovery
Y Aun, S Ramadass
TENCON 2014-2014 IEEE Region 10 Conference, 1-7, 2014
22014
Emerging Ransomware Attacks: Improvement and Remedies-A Systematic Literature Review
SA Wadho, A Yichiet, ML Gan, LC Kang, R Akbar, R Kumar
2023 4th International Conference on Artificial Intelligence and Data …, 2023
12023
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20