A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms A Diro, N Chilamkurti, VD Nguyen, W Heyne Sensors 21 (24), 8320, 2021 | 68 | 2021 |
Analysis of lightweight encryption scheme for fog-to-things communication AA Diro, N Chilamkurti, Y Nam IEEE Access 6, 26820-26830, 2018 | 64 | 2018 |
Analysis of rule based approach for Afan Oromo automatic morphological synthesizer A Abeshu Science, Technology and Arts Research Journal 2 (4), 94-97, 2013 | 3 | 2013 |
Anomaly Detection for Space Information Networks: A Survey of Challenges, Schemes, and Recommendations A Diro, S Kaisar, A V Vasilakos, A Anwar, A Nasirian, G Olani TechRxiv, 2023 | 1 | 2023 |
Anomaly detection for space information networks: A survey of challenges, techniques, and future directions A Diro, S Kaisar, AV Vasilakos, A Anwar, A Nasirian, G Olani Computers & Security 139, 103705, 2024 | 9 | 2024 |
Automatic Morphological Synthesizer for Afaan Oromoo AD Abebe Addis Ababa University, 2010 | 1 | 2010 |
Collaborative and integrated edge security architecture A Diro Secure Edge Computing, 21-39, 2021 | 2 | 2021 |
Collaborative intrusion detection schemes in fog-to-things computing A Diro, A Mahmood, N Chilamkurti Fog/edge computing for security, privacy, and applications, 93-119, 2021 | 7 | 2021 |
Cyber Security and Applications WS Admass, YY Munaye, AA Diro | | |
Cyber security: State of the art, challenges and future directions WS Admass, YY Munaye, A Diro Cyber Security and Applications, 100031, 2023 | 16 | 2023 |
Deep learning: The frontier for distributed attack detection in fog-to-things computing A Abeshu, N Chilamkurti IEEE Communications Magazine 56 (2), 169-175, 2018 | 392 | 2018 |
Differential flow space allocation scheme in SDN based fog computing for IoT applications AA Diro, HT Reda, N Chilamkurti Journal of Ambient Intelligence and Humanized Computing, 1-11, 2018 | 48 | 2018 |
Distributed attack detection scheme using deep learning approach for Internet of Things AA Diro, N Chilamkurti Future Generation Computer Systems 82, 761-768, 2018 | 966 | 2018 |
Distributed Lightweight Security Schemes for Fog-to-Things Computing A Diro La Trobe, 2019 | 2 | 2019 |
Dynamic and Fair Management of Flow Routing in OpenFlow A Abeshu, SY Shin 한국통신학회 학술대회논문집, 1501-1502, 2015 | | 2015 |
Efficient and secure data delivery in software defined WBAN for virtual hospital M Al Shayokh, A Abeshu, GB Satrya, MA Nugroho 2016 international conference on control, electronics, renewable energy and …, 2016 | 34 | 2016 |
Elliptic curve based cybersecurity schemes for publish-subscribe internet of things AA Diro, N Chilamkurti, P Veeraraghavan Quality, Reliability, Security and Robustness in Heterogeneous Networks …, 2017 | 14 | 2017 |
Enhancing Telemarketing Success Using Ensemble-Based Online Machine Learning S Kaisar, MM Rashid, A Chowdhury, SS Shafin, J Kamruzzaman, A Diro Big Data Mining and Analytics 7 (2), 294-314, 2024 | | 2024 |
Firefly-inspired stochastic resonance for spectrum sensing in CR-based IoT communications HT Reda, A Mahmood, A Diro, N Chilamkurti, S Kallam Neural Computing and Applications 32 (20), 16011-16023, 2020 | 10 | 2020 |
Leveraging Blockchain for Zero Knowledge Identify Sharing: A Survey of Advancements, Challenges and Opportunities A Diro, L Lu Zhou, A Saini, S Kaisar, H Pham Akanksha and Kaisar, Shahriar and Pham, Hiep, Leveraging Blockchain for Zero …, 2023 | 1 | 2023 |