Bogdan Ghita
Cited by
Cited by
On internet traffic classification: A two-phased machine learning approach
T Bakhshi, B Ghita
Journal of Computer Networks and Communications 2016, 2016
Assessing the global accessibility of the Internet
CU Ngini, SM Furnell, BV Ghita
Internet Research, 2002
Improvements to inter system handover in the EPC environment
S Frei, W Fuhrmann, A Rinkel, BV Ghita
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
Novel trust consensus protocol and blockchain-based trust evaluation system for M2M application services
B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles
Internet of Things 7, 100058, 2019
Blockchain and trust for secure, end-user-based and decentralized iot service provision
B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles
IEEE Access 8, 119961-119979, 2020
A new taxonomy for comparing intrusion detection systems
CJ Tucker, SM Furnell, BV Ghita, PJ Brooke
Internet Research, 2007
A novel online incremental learning intrusion prevention system
C Constantinides, S Shiaeles, B Ghita, N Kolokotronis
2019 10th IFIP International Conference on New Technologies, Mobility and …, 2019
Method for evaluating the bandwith of a digital link
J Schmitt, D Le Foll, B Ghita
US Patent App. 10/549,988, 2006
User traffic profiling
T Bakhshi, B Ghita
2015 Internet Technologies and Applications (ITA), 91-97, 2015
Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric
D Hock, M Kappes, B Ghita
Sustainable Energy, Grids and Networks 21, 100290, 2020
User-centric traffic optimization in residential software defined networks
T Bakhshi, B Ghita
2016 23rd International conference on telecommunications (ICT), 1-6, 2016
P2P-based community concept for M2M Applications
M Steinheimer, U Trick, W Fuhrmann, B Ghita
Second International Conference on Future Generation Communication …, 2013
MALGRA: Machine learning and N-gram malware feature extraction and detection system
M Ali, S Shiaeles, G Bendiab, B Ghita
Electronics 9 (11), 1777, 2020
Detection of lddos attacks based on tcp connection parameters
M Siracusano, S Shiaeles, B Ghita
2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2018
Malware squid: A novel iot malware traffic analysis framework using convolutional neural network and binary visualisation
R Shire, S Shiaeles, K Bendiab, B Ghita, N Kolokotronis
Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2019
Traffic profiling: Evaluating stability in multi-device user environments
T Bakhshi, B Ghita
2016 30th International Conference on Advanced Information Networking and …, 2016
QoS in SIP-based NGN–state of the art and new requirements
F Weber, W Fuhrmann, U Trick, U Bleimann, B Ghita
Proceedings of the third collaborative research symposium on Security, E …, 2007
FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management
G Bendiab, S Shiaeles, S Boucherkha, B Ghita
computers & security 86, 270-290, 2019
Mobile Edge Computing: Requirements for Powerful Mobile Near Real-Time Applications.
H Frank, WF Fuhrmann, BV Ghita
INC, 63-66, 2016
Bandwidth prediction schemes for defining bitrate levels in sdn-enabled adaptive streaming
AE Al-Issa, A Bentaleb, AA Barakabitze, T Zinner, B Ghita
2019 15th International Conference on Network and Service Management (CNSM), 1-7, 2019
The system can't perform the operation now. Try again later.
Articles 1–20