Citation Impact
Citing Papers
A Survey on Shari’Ah Governance Practices in Malaysia, GCC Countries and the UK
2011 Standout
Composing software-defined networks
2013
Understanding the mirai botnet
2017
Internet of Things is a revolutionary approach for future technology enhancement: a review
2019 Standout
Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach
2015
The industrial internet of things (IIoT): An analysis framework
2018 Standout
Software-Defined Networking: A Comprehensive Survey
2014 Standout
Machine Learning Based Botnet Identification Traffic
2016
Software defined cloud: Survey, system and evaluation
2015
A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges
2017 Standout
Software defined networking for security enhancement in wireless mobile networks
2014
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries
2019
Trustworthiness in Industrial IoT Systems Based on Artificial Intelligence
2020
A Survey and a Layered Taxonomy of Software-Defined Networking
2014
Deep Learning Approach for Intelligent Intrusion Detection System
2019 Standout
A survey on internet of vehicles: Applications, security issues & solutions
2019 Standout
Literature review of Industry 4.0 and related technologies
2018 Standout
Motor Anomaly Detection for Unmanned Aerial Vehicles Using Reinforcement Learning
2017 Standout
Nonorthogonal Multiple Access for 5G and Beyond
2017 Standout
OrchSec: An orchestrator-based architecture for enhancing network-security using Network Monitoring and SDN Control functions
2014
Software-Defined Mobile Networks Security
2016
Towards fast and lightweight spam account detection in mobile social networks through fog computing
2017
A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation
2014
A Survey on Software-Defined Networking
2014 Standout
An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks
2019
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
2016 Standout
Information-Theoretic Location Verification System With Directional Antennas for Vehicular Networks
2015
The rise of “big data” on cloud computing: Review and open research issues
2014 Standout
Your botnet is my botnet
2009
An Overview of IP Flow-Based Intrusion Detection
2010
A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques
2013
Energy system resilience – A review
2021 Standout
Design of Intrusion Detection System for Internet of Things Based on Improved BP Neural Network
2019 Standout
Industrial Internet-of-Things Security Enhanced With Deep Learning Approaches for Smart Cities
2020 Standout
Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends and Prospects for Emerging 5G-IoT Scenarios
2020 Standout
Analysis of KDD Dataset Attributes - Class wise for Intrusion Detection
2015
A survey on security control and attack detection for industrial cyber-physical systems
2017 Standout
Latent Dirichlet allocation (LDA) and topic modeling: models, applications, a survey
2018 Standout
A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks
2014 Standout
A Survey on Metaverse: Fundamentals, Security, and Privacy
2022 Standout
DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications
2018 Standout
Emotion Communication System
2016 Standout
New Security Architecture for IoT Network
2015
LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation
2016
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
2020 Standout
A survey of network anomaly detection techniques
2015 Standout
DDoS in the IoT: Mirai and Other Botnets
2017 Standout
SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures
2012
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
2019 Standout
Task Offloading for Mobile Edge Computing in Software Defined Ultra-Dense Network
2018 Standout
Network Function Virtualization: State-of-the-Art and Research Challenges
2015 Standout
Big data analysis of the Internet of Things in the digital twins of smart city based on deep learning
2021 Standout
Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks
2017
Design and implementation of an OpenFlow hardware abstraction layer
2014
Attack Detection and Distributed Forensics in Machine-to-Machine Networks
2016
Botnets: A survey
2012
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues
2020 Standout
An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers
2019
Cyber attack models for smart grid environments
2017
Internet of Things security: A survey
2017 Standout
A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements
2017
A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems
2018
Secure and dependable software defined networks
2015
Internet of Things in the 5G Era: Enablers, Architecture, and Business Models
2016 Standout
A hybrid GA and PSO optimized approach for heart-disease prediction based on random forest
2022 Standout
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
2015 Standout
Security in Software Defined Networks: A Survey
2015
Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests
2014
StreaMon: A software-defined monitoring platform
2014
Monitoring abnormal network traffic based on blind source separation approach
2011
Works of Guofei Gu being referenced
FRESCO: Modular Composable Security Services for Software-Defined Networks
2013
BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection
2008
BotHunter: detecting malware infection through IDS-driven dialog correlation
2007
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic
2008
A Large-Scale Empirical Study of Conficker
2011
Measuring intrusion detection capability
2006
Worm Detection Using Local Networks
2004
An Information-Theoretic Measure of Intrusion Detection Capability
2005
A First Step Toward Network Security Virtualization: From Concept To Prototype
2015
Malware Propagation in Large-Scale Networks
2014
Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers
2013