Follow
Monowar Bhuyan
Monowar Bhuyan
Assistant Professor of Computer Science, Umeå University, Sweden.
Verified email at cs.umu.se - Homepage
Title
Cited by
Cited by
Year
Network anomaly detection: methods, systems and tools
MH Bhuyan, DK Bhattacharyya, JK Kalita
Ieee communications surveys & tutorials 16 (1), 303-336, 2013
15662013
Network attacks: Taxonomy, tools and systems
N Hoque, MH Bhuyan, RC Baishya, DK Bhattacharyya, JK Kalita
Journal of Network and Computer Applications 40, 307-324, 2014
3342014
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
Pattern Recognition Letters 51, 1-7, 2015
2652015
Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions
MH Bhuyan, HJ Kashyap, DK Bhattacharyya, JK Kalita
The Computer Journal 57 (4), 537-556, 2013
2472013
Surveying Port Scans and Their Detection Methodologies
MH Bhuyan, DK Bhattacharyya, JK Kalita
The Computer Journal 54 (10), 1565-1581, 2011
2232011
Packet and Flow Based Network Intrusion Dataset
P Gogoi, MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Contemporary Computing, 322-334, 2012
1912012
Towards Generating Real-life Datasets for Network Intrusion Detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Network Security 17 (6), 675-693, 2015
1672015
A multi-step outlier-based anomaly detection approach to network-wide traffic
MH Bhuyan, DK Bhattacharyya, JK Kalita
Information Sciences 348, 243-271, 2016
1182016
Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools
MH Bhuyan, DK Bhattacharyya, JK Kalita
792017
Survey on Incremental Approaches for Network Anomaly Detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Communication Networks and Information Security …, 2011
662011
E‐LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
MH Bhuyan, DK Bhattacharyya, JK Kalita
Security and Communication Networks 9 (16), 3251-3270, 2016
572016
An Effective Unsupervised Network Anomaly Detection Method
MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Advances in Computing …, 2012
562012
NADO: network anomaly detection using outlier approach
MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Communication, Computing …, 2011
482011
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT
E Tsogbaatar, MH Bhuyan, Y Taenaka, D Fall, K Gonchigsumlaa, ...
Internet of Things 14, 100391, 2021
472021
AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Network Security 14 (6), 339-351, 2012
402012
An effective method for fingerprint classification
MH Bhuyan, S Saharia, DK Bhattacharyya
International Arab Journal of e-technology 1 (3), 89-97, 2010
402010
SURE-H: A Secure IoT Enabled Smart Home System
R Sarmah, M Bhuyan, MH Bhuyan
2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 59-63, 2019
352019
Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation
MH Bhuyan, A Kalwar, A Goswami, DK Bhattacharyya, JK Kalita
Fifth International Conference on Communication Systems and Network …, 2015
342015
Hierarchical load balancing and clustering technique for home edge computing
CSM Babou, D Fall, S Kashihara, Y Taenaka, MH Bhuyan, I Niang, ...
IEEE Access 8, 127593-127607, 2020
332020
Information metrics for low-rate DDoS attack detection: A comparative evaluation
MH Bhuyan, DK Bhattacharyya, JK Kalita
Seventh International Conference on Contemporary Computing (IC3), 80-84, 2014
322014
The system can't perform the operation now. Try again later.
Articles 1–20