Follow
Bogdan Ghita
Title
Cited by
Cited by
Year
On internet traffic classification: A two-phased machine learning approach
T Bakhshi, B Ghita
Journal of Computer Networks and Communications 2016, 2016
922016
Assessing the global accessibility of the Internet
CU Ngini, SM Furnell, BV Ghita
Internet Research 12 (4), 329-338, 2002
652002
Novel trust consensus protocol and blockchain-based trust evaluation system for M2M application services
B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles
Internet of Things 7, 100058, 2019
492019
Improvements to inter system handover in the EPC environment
S Frei, W Fuhrmann, A Rinkel, BV Ghita
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
422011
Blockchain and trust for secure, end-user-based and decentralized iot service provision
B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles
IEEE Access 8, 119961-119979, 2020
402020
A novel online incremental learning intrusion prevention system
C Constantinides, S Shiaeles, B Ghita, N Kolokotronis
2019 10th IFIP International Conference on New Technologies, Mobility and …, 2019
372019
A new taxonomy for comparing intrusion detection systems
CJ Tucker, SM Furnell, BV Ghita, PJ Brooke
Internet Research 17 (1), 88-98, 2007
332007
MALGRA: Machine learning and N-gram malware feature extraction and detection system
M Ali, S Shiaeles, G Bendiab, B Ghita
Electronics 9 (11), 1777, 2020
302020
Method for evaluating the bandwith of a digital link
J Schmitt, D Le Foll, B Ghita
US Patent App. 10/549,988, 2006
262006
User traffic profiling
T Bakhshi, B Ghita
2015 Internet Technologies and Applications (ITA), 91-97, 2015
242015
Malware squid: A novel iot malware traffic analysis framework using convolutional neural network and binary visualisation
R Shire, S Shiaeles, K Bendiab, B Ghita, N Kolokotronis
Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2019
232019
Detection of LDDoS attacks based on TCP connection parameters
M Siracusano, S Shiaeles, B Ghita
2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2018
232018
Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric
D Hock, M Kappes, B Ghita
Sustainable Energy, Grids and Networks 21, 100290, 2020
222020
FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management
G Bendiab, S Shiaeles, S Boucherkha, B Ghita
computers & security 86, 270-290, 2019
212019
User-centric traffic optimization in residential software defined networks
T Bakhshi, B Ghita
2016 23rd International conference on telecommunications (ICT), 1-6, 2016
202016
Wireless sensors for brain activity—a survey
M TajDini, V Sokolov, I Kuzminykh, S Shiaeles, B Ghita
Electronics 9 (12), 2092, 2020
192020
Traffic profiling: Evaluating stability in multi-device user environments
T Bakhshi, B Ghita
2016 30th International Conference on Advanced Information Networking and …, 2016
192016
P2P-based community concept for M2M Applications
M Steinheimer, U Trick, W Fuhrmann, B Ghita
Second International Conference on Future Generation Communication …, 2013
192013
QoS in SIP-based NGN–state of the art and new requirements
F Weber, W Fuhrmann, U Trick, U Bleimann, B Ghita
Proceedings of the third collaborative research symposium on Security, E …, 2007
182007
Mobile Edge Computing: Requirements for Powerful Mobile Near Real-Time Applications.
H Frank, WF Fuhrmann, BV Ghita
INC, 63-66, 2016
152016
The system can't perform the operation now. Try again later.
Articles 1–20