Monowar H. Bhuyan
Monowar H. Bhuyan
Assistant Professor of Computing Science, UmeŚ University; and Senior Data Scientist, Elastisys AB
Verified email at cs.umu.se - Homepage
Title
Cited by
Cited by
Year
Network anomaly detection: methods, systems and tools
MH Bhuyan, DK Bhattacharyya, JK Kalita
Ieee communications surveys & tutorials 16 (1), 303-336, 2013
8252013
Network attacks: Taxonomy, tools and systems
N Hoque, MH Bhuyan, RC Baishya, DK Bhattacharyya, JK Kalita
Journal of Network and Computer Applications 40, 307-324, 2014
1872014
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
Pattern Recognition Letters 51, 1-7, 2015
1592015
Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions
MH Bhuyan, HJ Kashyap, DK Bhattacharyya, JK Kalita
The Computer Journal 57 (4), 537-556, 2013
1482013
Surveying Port Scans and Their Detection Methodologies
MH Bhuyan, DK Bhattacharyya, JK Kalita
The Computer Journal 54 (10), 1565-1581, 2011
1362011
Packet and Flow Based Network Intrusion Dataset
P Gogoi, MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Contemporary Computing, 322-334, 2012
1022012
A multi-step outlier-based anomaly detection approach to network-wide traffic
MH Bhuyan, DK Bhattacharyya, JK Kalita
Information Sciences 348, 243-271, 2016
712016
Towards Generating Real-life Datasets for Network Intrusion Detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Network Security 17 (6), 675-693, 2015
702015
Survey on Incremental Approaches for Network Anomaly Detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Communication Networks and Information Security†…, 2011
422011
An Effective Unsupervised Network Anomaly Detection Method
MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Advances in Computing†…, 2012
412012
NADO: network anomaly detection using outlier approach
MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Communication, Computing†…, 2011
372011
AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Network Security 14 (6), 339-351, 2012
342012
An effective method for fingerprint classification
MH Bhuyan, S Saharia, DK Bhattacharyya
International Arab Journal of e-technology 1 (3), 89-97, 2010
312010
E‐LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
MH Bhuyan, DK Bhattacharyya, JK Kalita
Security and Communication Networks 9 (16), 3251-3270, 2016
302016
Information metrics for low-rate DDoS attack detection: A comparative evaluation
MH Bhuyan, DK Bhattacharyya, JK Kalita
Seventh International Conference on Contemporary Computing (IC3), 80-84, 2014
212014
Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools
MH Bhuyan, DK Bhattacharyya, JK Kalita
192017
Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation
A Ain, MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Network Security 18 (3), 474-480, 2016
172016
Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation
MH Bhuyan, A Kalwar, A Goswami, DK Bhattacharyya, JK Kalita
Fifth International Conference on Communication Systems and Network†…, 2015
172015
RODD: An Effective Reference based Outlier Detection Technique for Large Datasets
MH Bhuyan, DK Bhattacharyya, JK Kalita
Advanced Computing, LNCS-CCIS, Part III 133, 76-84, 2011
132011
An Effective Fingerprint Classification and Search Method
MH Bhuyan, DK Bhattacharyya
International Journal of Computer Science and Network Security 9 (11), 39-48, 2009
112009
The system can't perform the operation now. Try again later.
Articles 1–20