On internet traffic classification: a two‐phased machine learning approach T Bakhshi, B Ghita Journal of Computer Networks and Communications 2016 (1), 2048302, 2016 | 108 | 2016 |
Assessing the global accessibility of the Internet CU Ngini, SM Furnell, BV Ghita Internet Research 12 (4), 329-338, 2002 | 73 | 2002 |
Blockchain and trust for secure, end-user-based and decentralized IoT service provision B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles IEEE Access 8, 119961-119979, 2020 | 69 | 2020 |
A novel online incremental learning intrusion prevention system C Constantinides, S Shiaeles, B Ghita, N Kolokotronis 2019 10th IFIP International Conference on New Technologies, Mobility and …, 2019 | 68 | 2019 |
MALGRA: Machine learning and N-gram malware feature extraction and detection system M Ali, S Shiaeles, G Bendiab, B Ghita Electronics 9 (11), 1777, 2020 | 66 | 2020 |
Novel trust consensus protocol and blockchain-based trust evaluation system for M2M application services B Shala, U Trick, A Lehmann, B Ghita, S Shiaeles Internet of Things 7, 100058, 2019 | 65 | 2019 |
Information security risk assessment I Kuzminykh, B Ghita, V Sokolov, T Bakhshi Encyclopedia 1 (3), 602-617, 2021 | 55 | 2021 |
Wireless sensors for brain activity—A survey M TajDini, V Sokolov, I Kuzminykh, S Shiaeles, B Ghita Electronics 9 (12), 2092, 2020 | 47 | 2020 |
FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management G Bendiab, S Shiaeles, S Boucherkha, B Ghita computers & security 86, 270-290, 2019 | 42 | 2019 |
Improvements to inter system handover in the EPC environment S Frei, W Fuhrmann, A Rinkel, BV Ghita 2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011 | 42 | 2011 |
Malware squid: A novel iot malware traffic analysis framework using convolutional neural network and binary visualisation R Shire, S Shiaeles, K Bendiab, B Ghita, N Kolokotronis Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2019 | 39 | 2019 |
Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric D Hock, M Kappes, B Ghita Sustainable Energy, Grids and Networks 21, 100290, 2020 | 34 | 2020 |
A new taxonomy for comparing intrusion detection systems CJ Tucker, SM Furnell, BV Ghita, PJ Brooke Internet Research 17 (1), 88-98, 2007 | 34 | 2007 |
Detection of LDDoS attacks based on TCP connection parameters M Siracusano, S Shiaeles, B Ghita 2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2018 | 30 | 2018 |
User traffic profiling T Bakhshi, B Ghita 2015 Internet Technologies and Applications (ITA), 91-97, 2015 | 30 | 2015 |
Method for evaluating the bandwith of a digital link J Schmitt, D Le Foll, B Ghita US Patent App. 10/549,988, 2006 | 29 | 2006 |
Anomaly detection in encrypted internet traffic using hybrid deep learning T Bakhshi, B Ghita Security and Communication Networks 2021 (1), 5363750, 2021 | 27 | 2021 |
Detection of insider threats using artificial intelligence and visualisation V Koutsouvelis, S Shiaeles, B Ghita, G Bendiab 2020 6th IEEE Conference on Network Softwarization (NetSoft), 437-443, 2020 | 25 | 2020 |
A blockchain secured pharmaceutical distribution system to fight counterfeiting K Zoughalian, J Marchang, B Ghita International Journal of Environmental Research and Public Health 19 (7), 4091, 2022 | 22 | 2022 |
User-centric traffic optimization in residential software defined networks T Bakhshi, B Ghita 2016 23rd International conference on telecommunications (ICT), 1-6, 2016 | 22 | 2016 |