Bogdan Ghita
Cited by
Cited by
On internet traffic classification: a two‐phased machine learning approach
T Bakhshi, B Ghita
Journal of Computer Networks and Communications 2016 (1), 2048302, 2016
Assessing the global accessibility of the Internet
CU Ngini, SM Furnell, BV Ghita
Internet Research 12 (4), 329-338, 2002
Novel trust consensus protocol and blockchain-based trust evaluation system for M2M application services
B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles
Internet of Things 7, 100058, 2019
A novel online incremental learning intrusion prevention system
C Constantinides, S Shiaeles, B Ghita, N Kolokotronis
2019 10th IFIP International Conference on New Technologies, Mobility and …, 2019
Blockchain and trust for secure, end-user-based and decentralized IoT service provision
B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles
IEEE Access 8, 119961-119979, 2020
MALGRA: Machine learning and N-gram malware feature extraction and detection system
M Ali, S Shiaeles, G Bendiab, B Ghita
Electronics 9 (11), 1777, 2020
Information security risk assessment
I Kuzminykh, B Ghita, V Sokolov, T Bakhshi
Encyclopedia 1 (3), 602-617, 2021
Wireless sensors for brain activity—A survey
M TajDini, V Sokolov, I Kuzminykh, S Shiaeles, B Ghita
Electronics 9 (12), 2092, 2020
Improvements to inter system handover in the EPC environment
S Frei, W Fuhrmann, A Rinkel, BV Ghita
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management
G Bendiab, S Shiaeles, S Boucherkha, B Ghita
computers & security 86, 270-290, 2019
Malware squid: A novel iot malware traffic analysis framework using convolutional neural network and binary visualisation
R Shire, S Shiaeles, K Bendiab, B Ghita, N Kolokotronis
Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2019
A new taxonomy for comparing intrusion detection systems
CJ Tucker, SM Furnell, BV Ghita, PJ Brooke
Internet Research 17 (1), 88-98, 2007
Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric
D Hock, M Kappes, B Ghita
Sustainable Energy, Grids and Networks 21, 100290, 2020
Detection of LDDoS attacks based on TCP connection parameters
M Siracusano, S Shiaeles, B Ghita
2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2018
Method for evaluating the bandwith of a digital link
J Schmitt, D Le Foll, B Ghita
US Patent App. 10/549,988, 2006
User traffic profiling
T Bakhshi, B Ghita
2015 Internet Technologies and Applications (ITA), 91-97, 2015
Detection of insider threats using artificial intelligence and visualisation
V Koutsouvelis, S Shiaeles, B Ghita, G Bendiab
2020 6th IEEE Conference on Network Softwarization (NetSoft), 437-443, 2020
User-centric traffic optimization in residential software defined networks
T Bakhshi, B Ghita
2016 23rd International conference on telecommunications (ICT), 1-6, 2016
Anomaly detection in encrypted internet traffic using hybrid deep learning
T Bakhshi, B Ghita
Security and Communication Networks 2021 (1), 5363750, 2021
Traffic profiling: Evaluating stability in multi-device user environments
T Bakhshi, B Ghita
2016 30th International Conference on Advanced Information Networking and …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20