Follow
Monowar Bhuyan
Monowar Bhuyan
Assistant Professor of Computer Science, UmeŚ University, Sweden.
Verified email at cs.umu.se - Homepage
Title
Cited by
Cited by
Year
Network anomaly detection: methods, systems and tools
MH Bhuyan, DK Bhattacharyya, JK Kalita
Ieee communications surveys & tutorials 16 (1), 303-336, 2013
15632013
Network attacks: Taxonomy, tools and systems
N Hoque, MH Bhuyan, RC Baishya, DK Bhattacharyya, JK Kalita
Journal of Network and Computer Applications 40, 307-324, 2014
3302014
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
Pattern Recognition Letters 51, 1-7, 2015
2662015
Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions
MH Bhuyan, HJ Kashyap, DK Bhattacharyya, JK Kalita
The Computer Journal 57 (4), 537-556, 2013
2462013
Surveying Port Scans and Their Detection Methodologies
MH Bhuyan, DK Bhattacharyya, JK Kalita
The Computer Journal 54 (10), 1565-1581, 2011
2232011
Packet and Flow Based Network Intrusion Dataset
P Gogoi, MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Contemporary Computing, 322-334, 2012
1912012
Towards Generating Real-life Datasets for Network Intrusion Detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Network Security 17 (6), 675-693, 2015
1652015
A multi-step outlier-based anomaly detection approach to network-wide traffic
MH Bhuyan, DK Bhattacharyya, JK Kalita
Information Sciences 348, 243-271, 2016
1232016
Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools
MH Bhuyan, DK Bhattacharyya, JK Kalita
782017
Survey on Incremental Approaches for Network Anomaly Detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Communication Networks and Information Security†…, 2011
672011
E‐LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
MH Bhuyan, DK Bhattacharyya, JK Kalita
Security and Communication Networks 9 (16), 3251-3270, 2016
572016
An Effective Unsupervised Network Anomaly Detection Method
MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Advances in Computing†…, 2012
552012
NADO: network anomaly detection using outlier approach
MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Communication, Computing†…, 2011
482011
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT
E Tsogbaatar, MH Bhuyan, Y Taenaka, D Fall, K Gonchigsumlaa, ...
Internet of Things 14, 100391, 2021
442021
AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Network Security 14 (6), 339-351, 2012
402012
An effective method for fingerprint classification
MH Bhuyan, S Saharia, DK Bhattacharyya
International Arab Journal of e-technology 1 (3), 89-97, 2010
382010
SURE-H: a secure IoT enabled smart home system
R Sarmah, M Bhuyan, MH Bhuyan
2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 59-63, 2019
342019
Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation
MH Bhuyan, A Kalwar, A Goswami, DK Bhattacharyya, JK Kalita
Fifth International Conference on Communication Systems and Network†…, 2015
342015
Hierarchical load balancing and clustering technique for home edge computing
CSM Babou, D Fall, S Kashihara, Y Taenaka, MH Bhuyan, I Niang, ...
IEEE Access 8, 127593-127607, 2020
332020
Information metrics for low-rate DDoS attack detection: A comparative evaluation
MH Bhuyan, DK Bhattacharyya, JK Kalita
Seventh International Conference on Contemporary Computing (IC3), 80-84, 2014
322014
The system can't perform the operation now. Try again later.
Articles 1–20