Search results for: Raheem Beyah
International Journal of Intelligent Systems > 37 > 9 > 6463 - 6492
Advanced Functional Materials > 32 > 28 > n/a - n/a
Wireless Networks > 2019 > 25 > 7 > 3805-3823
Cybersecurity > 2018 > 1 > 1 > 1-18
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 545 - 558
Proceedings of the IEEE > 2018 > 106 > 1 > 61 - 70
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 5 > 550 - 564
2017 IEEE Symposium on Security and Privacy (SP) > 805 - 823
IEEE Communications Surveys & Tutorials > 2017 > 19 > 2 > 1305 - 1326
Ad Hoc Networks > 2016 > 53 > C > 1-16
IEEE/ACM Transactions on Networking > 2016 > 24 > 6 > 3523 - 3536
IEEE Internet Computing > 2016 > 20 > 5 > 9 - 17
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 7 > 1398 - 1411
2016 IEEE Symposium on Security and Privacy (SP) > 707 - 723
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Emulation-Based Detection > 48-67
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Malware Detection and Prevention (II) > 304-325
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Security and Privacy in Communication Networks > Wireless Network Security III > 394-416