Articles with public access mandates - Monowar BhuyanLearn more
Not available anywhere: 12
Network attacks: Taxonomy, tools and systems
N Hoque, M Bhuyan, RC Baishya, DK Bhattacharyya, JK Kalita
Journal of Network and Computer Applications 40, 307-324, 2014
Mandates: Council of Scientific and Industrial Research, India
A multi-step outlier-based anomaly detection approach to network-wide traffic
M Bhuyan, DK Bhattacharyya, JK Kalita
Information Sciences 348, 243-271, 2016
Mandates: Council of Scientific and Industrial Research, India
CA-KEP: A Secure CA Based 2-Party Key Exchange Protocol
M Bhuyan, DK Bhattacharyya, JK Kalita
Journal of Information Assurance and Security 7 (3), 193-206, 2012
Mandates: Council of Scientific and Industrial Research, India
Cognit: Challenges and vision for a serverless and multi-provider cognitive cloud-edge continuum
P Townend, AP Martí, I De La Iglesia, N Matskanis, TO Timoudas, ...
2023 IEEE International Conference on Edge Computing and Communications …, 2023
Mandates: European Commission
Cost-Efficient Feature Selection for Horizontal Federated Learning
S Banerjee, D Bhuyan, E Elmroth, M Bhuyan
IEEE Transactions on Artificial Intelligence, 2024
Mandates: Knut and Alice Wallenberg Foundation
Securing P4-SDN Data Plane against Flow Table Modification Attack
BA Reddy, KS Sahoo, M Bhuyan
NOMS 2024-2024 IEEE Network Operations and Management Symposium, 1-5, 2024
Mandates: Knut and Alice Wallenberg Foundation, European Commission
Unified Identification of Anomalies on the Edge: A Hybrid Sequential PGM Approach
J Forough, M Bhuyan, E Elmroth
2023 IEEE 22nd International Conference on Trust, Security and Privacy in …, 2023
Mandates: Knut and Alice Wallenberg Foundation
Anomaly Detection and Resolution on the Edge: Solutions and Future Directions
J Forough, M Bhuyan, E Elmroth
2023 IEEE International Conference on Service-Oriented System Engineering …, 2023
Mandates: Knut and Alice Wallenberg Foundation, European Commission
FloRa: Flow Table Low-Rate Overflow Reconnaissance and Detection in SDN
A Mudgal, A Verma, M Singh, KS Sahoo, E Elmroth, M Bhuyan
IEEE Transactions on Network and Service Management, 2024
Mandates: Knut and Alice Wallenberg Foundation, European Commission
Combining Block Bootstrap with Exponential Smoothing for Reinforcing Non-Emergency Urban Service Prediction
KS Sahoo, S Krishana, M Bhuyan
2023 IEEE International Conference on Big Data (BigData), 4335-4343, 2023
Mandates: Knut and Alice Wallenberg Foundation
Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis
R Araki, KS Sahoo, Y Taenaka, Y Kadobayashi, E Elmroth, M Bhuyan
2023 IEEE 22nd International Conference on Trust, Security and Privacy in …, 2023
Mandates: Knut and Alice Wallenberg Foundation
Towards a Workload Mapping Model for Tuning Backing Services in Cloud Systems
G Kumar, KS Sahoo, M Bhuyan
International Conference on Database and Expert Systems Applications, 266-280, 2023
Mandates: Knut and Alice Wallenberg Foundation, European Commission
Recused: 6
Fed-FiS: A novel information-theoretic federated feature selection for learning stability
S Banerjee, E Elmroth, M Bhuyan
International Conference on Neural Information Processing, 480-487, 2021
Mandates: Knut and Alice Wallenberg Foundation
Responsible authors: S Banerjee
Detection of VSI-DDoS attacks on the edge: A sequential modeling approach
J Forough, M Bhuyan, E Elmroth
Proceedings of the 16th International Conference on Availability …, 2021
Mandates: Knut and Alice Wallenberg Foundation
Responsible authors: J Forough
Semi-supervised range-based anomaly detection for cloud systems
PK Deka, Y Verma, AB Bhutto, E Elmroth, M Bhuyan
IEEE Transactions on Network and Service Management 20 (2), 1290-1304, 2022
Mandates: Knut and Alice Wallenberg Foundation
Responsible authors: PK Deka
MetaVSID: A Robust Meta-Reinforced Learning Approach for VSI-DDoS Detection on the Edge
XS Vu, M Ma, M Bhuyan
IEEE Transactions on Network and Service Management 20 (2), 1625-1643, 2022
Mandates: Knut and Alice Wallenberg Foundation
Responsible authors: XS Vu
A 1D-CNN based deep learning for detecting VSI-DDoS attacks in IoT applications
E Tsogbaatar, M Bhuyan, D Fall, Y Taenaka, K Gonchigsumlaa, E Elmroth, ...
Advances and Trends in Artificial Intelligence. Artificial Intelligence …, 2021
Mandates: Knut and Alice Wallenberg Foundation
Responsible authors: E Tsogbaatar
DELA: A Deep Ensemble Learning Approach for Cross-layer VSI-DDoS Detection on the Edge
J Forough, M Bhuyan, E Elmroth
2022 IEEE 42nd International Conference on Distributed Computing Systems …, 2022
Mandates: Knut and Alice Wallenberg Foundation
Responsible authors: J Forough
Available somewhere: 22
Network anomaly detection: methods, systems and tools
M Bhuyan, DK Bhattacharyya, JK Kalita
Ieee communications surveys & tutorials 16 (1), 303-336, 2013
Mandates: Council of Scientific and Industrial Research, India
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
M Bhuyan, DK Bhattacharyya, JK Kalita
Pattern Recognition Letters 51, 1-7, 2015
Mandates: Council of Scientific and Industrial Research, India
Publication and funding information is determined automatically by a computer program