Follow
Monowar Bhuyan
Monowar Bhuyan
Assistant Professor of Computer Science, Umeå University, Sweden.
Verified email at cs.umu.se - Homepage
Title
Cited by
Cited by
Year
Network anomaly detection: methods, systems and tools
MH Bhuyan, DK Bhattacharyya, JK Kalita
Ieee communications surveys & tutorials 16 (1), 303-336, 2013
15832013
Network attacks: Taxonomy, tools and systems
N Hoque, MH Bhuyan, RC Baishya, DK Bhattacharyya, JK Kalita
Journal of Network and Computer Applications 40, 307-324, 2014
3372014
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
Pattern Recognition Letters 51, 1-7, 2015
2692015
Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions
MH Bhuyan, HJ Kashyap, DK Bhattacharyya, JK Kalita
The Computer Journal 57 (4), 537-556, 2013
2502013
Surveying Port Scans and Their Detection Methodologies
MH Bhuyan, DK Bhattacharyya, JK Kalita
The Computer Journal 54 (10), 1565-1581, 2011
2232011
Packet and Flow Based Network Intrusion Dataset
P Gogoi, MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Contemporary Computing, 322-334, 2012
1932012
Towards Generating Real-life Datasets for Network Intrusion Detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Network Security 17 (6), 675-693, 2015
1682015
A multi-step outlier-based anomaly detection approach to network-wide traffic
MH Bhuyan, DK Bhattacharyya, JK Kalita
Information Sciences 348, 243-271, 2016
1212016
Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools
MH Bhuyan, DK Bhattacharyya, JK Kalita
802017
Survey on Incremental Approaches for Network Anomaly Detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Communication Networks and Information Security …, 2011
662011
E‐LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
MH Bhuyan, DK Bhattacharyya, JK Kalita
Security and Communication Networks 9 (16), 3251-3270, 2016
572016
An Effective Unsupervised Network Anomaly Detection Method
MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Advances in Computing …, 2012
562012
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT
E Tsogbaatar, MH Bhuyan, Y Taenaka, D Fall, K Gonchigsumlaa, ...
Internet of Things 14, 100391, 2021
482021
NADO: network anomaly detection using outlier approach
MH Bhuyan, DK Bhattacharyya, JK Kalita
Proceedings of the International Conference on Communication, Computing …, 2011
482011
AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach
MH Bhuyan, DK Bhattacharyya, JK Kalita
International Journal of Network Security 14 (6), 339-351, 2012
402012
An effective method for fingerprint classification
MH Bhuyan, S Saharia, DK Bhattacharyya
International Arab Journal of e-technology 1 (3), 89-97, 2010
402010
SURE-H: A Secure IoT Enabled Smart Home System
R Sarmah, M Bhuyan, MH Bhuyan
2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 59-63, 2019
382019
Hierarchical load balancing and clustering technique for home edge computing
CSM Babou, D Fall, S Kashihara, Y Taenaka, MH Bhuyan, I Niang, ...
IEEE Access 8, 127593-127607, 2020
342020
Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation
MH Bhuyan, A Kalwar, A Goswami, DK Bhattacharyya, JK Kalita
Fifth International Conference on Communication Systems and Network …, 2015
342015
Information metrics for low-rate DDoS attack detection: A comparative evaluation
MH Bhuyan, DK Bhattacharyya, JK Kalita
Seventh International Conference on Contemporary Computing (IC3), 80-84, 2014
322014
The system can't perform the operation now. Try again later.
Articles 1–20