default search action
Monowar H. Bhuyan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Tobias Meuser, Lauri Lovén, Monowar H. Bhuyan, Shishir G. Patil, Schahram Dustdar, Atakan Aral, Suzan Bayhan, Christian Becker, Eyal de Lara, Aaron Yi Ding, Janick Edinger, James Gross, Nitinder Mohan, Andy D. Pimentel, Etienne Rivière, Henning Schulzrinne, Pieter Simoens, Gürkan Solmaz, Michael Welzl:
Revisiting Edge AI: Opportunities and Challenges. IEEE Internet Comput. 28(4): 49-59 (2024) - [j20]Tobias Sundqvist, Monowar H. Bhuyan, Erik Elmroth:
Robust Procedural Learning for Anomaly Detection and Observability in 5G RAN. IEEE Trans. Netw. Serv. Manag. 21(2): 1432-1445 (2024) - [c36]Buchammagari Avinash Reddy, Kshira Sagar Sahoo, Monowar H. Bhuyan:
Securing P4-SDN Data Plane against Flow Table Modification Attack. NOMS 2024: 1-5 - [i5]Sourasekhar Banerjee, Ali Dadras, Alp Yurtsever, Monowar H. Bhuyan:
Personalized Multi-tier Federated Learning. CoRR abs/2407.14251 (2024) - 2023
- [j19]Pratyush Kr. Deka, Yash Verma, Adil Bin Bhutto, Erik Elmroth, Monowar H. Bhuyan:
Semi-Supervised Range-Based Anomaly Detection for Cloud Systems. IEEE Trans. Netw. Serv. Manag. 20(2): 1290-1304 (2023) - [j18]Xuan-Son Vu, Maode Ma, Monowar H. Bhuyan:
MetaVSID: A Robust Meta-Reinforced Learning Approach for VSI-DDoS Detection on the Edge. IEEE Trans. Netw. Serv. Manag. 20(2): 1625-1643 (2023) - [c35]Kshira Sagar Sahoo, Shivam Krishana, Monowar H. Bhuyan:
Combining Block Bootstrap with Exponential Smoothing for Reinforcing Non-Emergency Urban Service Prediction. IEEE Big Data 2023: 4335-4343 - [c34]Tobias Sundqvist, Monowar H. Bhuyan, Erik Elmroth:
Bottleneck identification and failure prevention with procedural learning in 5G RAN. CCGrid 2023: 426-436 - [c33]Gaurav Kumar, Kshira Sagar Sahoo, Monowar H. Bhuyan:
Towards a Workload Mapping Model for Tuning Backing Services in Cloud Systems. DEXA (1) 2023: 266-280 - [c32]Paul Townend, Alberto P. Martí, Idoia De-la-Iglesia, Nikolaos Matskanis, Thomas Ohlson Timoudas, Torsten Hallmann, Antonio Lalaguna, Kaja Swat, Francesco Renzi, Dominik Bochenski, Marco Mancini, Monowar H. Bhuyan, Marco González-Hierro, Sébastien Dupont, Johan Kristiansson, Rubén S. Montero, Erik Elmroth, Ivá Valdés, Philippe Massonet, Daniel Olsson, Ignacio Martín Llorente, Per-Olov Östberg, Michael Abdou:
COGNIT: Challenges and Vision for a Serverless and Multi-Provider Cognitive Cloud-Edge Continuum. EDGE 2023: 12-22 - [c31]Sourasekhar Banerjee, Yashwant Singh Patel, Pushkar Kumar, Monowar H. Bhuyan:
Towards Post-disaster Damage Assessment using Deep Transfer Learning and GAN-based Data Augmentation. ICDCN 2023: 372-377 - [c30]Arezoo Hatefi, Xuan-Son Vu, Monowar H. Bhuyan, Frank Drewes:
ADCluster: Adaptive Deep Clustering for Unsupervised Learning from Unlabeled Documents. ICNLSP 2023: 68-77 - [c29]Anindya Sundar Das, Aravind Ajay, Sriparna Saha, Monowar H. Bhuyan:
Few-Shot Anomaly Detection in Text with Deviation Learning. ICONIP (2) 2023: 425-438 - [c28]Javad Forough, Monowar H. Bhuyan, Erik Elmroth:
Anomaly Detection and Resolution on the Edge: Solutions and Future Directions. SOSE 2023: 227-238 - [c27]Ryosuke Araki, Kshira Sagar Sahoo, Yuzo Taenaka, Youki Kadobayashi, Erik Elmroth, Monowar H. Bhuyan:
Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis. TrustCom 2023: 485-494 - [c26]Javad Forough, Monowar H. Bhuyan, Erik Elmroth:
Unified Identification of Anomalies on the Edge: A Hybrid Sequential PGM Approach. TrustCom 2023: 595-604 - [i4]Anindya Sundar Das, Aravind Ajay, Sriparna Saha, Monowar H. Bhuyan:
Few-shot Anomaly Detection in Text with Deviation Learning. CoRR abs/2308.11780 (2023) - 2022
- [j17]Adil Bin Bhutto, Xuan-Son Vu, Erik Elmroth, Wee Peng Tay, Monowar H. Bhuyan:
Reinforced Transformer Learning for VSI-DDoS Detection in Edge Clouds. IEEE Access 10: 94677-94690 (2022) - [j16]N'guessan Yves-Roland Douha, Monowar H. Bhuyan, Shigeru Kashihara, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
A survey on blockchain, SDN and NFV for the smart-home security. Internet Things 20: 100588 (2022) - [c25]William Tärneberg, Emma Fitzgerald, Monowar H. Bhuyan, Paul Townend, Karl-Erik Årzén, Per-Olov Östberg, Erik Elmroth, Johan Eker, Fredrik Tufvesson, Maria Kihl:
The 6G Computing Continuum (6GCC): Meeting the 6G computing challenges. 6GNet 2022: 1-5 - [c24]Tobias Sundqvist, Monowar H. Bhuyan, Erik Elmroth:
Unsupervised root-cause identification of software bugs in 5G RAN. CCNC 2022: 624-630 - [c23]Tobias Sundqvist, Monowar H. Bhuyan, Erik Elmroth:
Uncovering latency anomalies in 5G RAN - A combination learner approach. COMSNETS 2022: 621-629 - [c22]Javad Forough, Monowar H. Bhuyan, Erik Elmroth:
DELA: A Deep Ensemble Learning Approach for Cross-layer VSI-DDoS Detection on the Edge. ICDCS 2022: 1155-1165 - [c21]Monowar H. Bhuyan, Juan Carlos Nieves:
Argumentation-Based Adversarial Regression with Multiple Learners. ICTAI 2022: 96-104 - [c20]Sourasekhar Banerjee, Xuan-Son Vu, Monowar H. Bhuyan:
Optimized and Adaptive Federated Learning for Straggler-Resilient Device Selection. IJCNN 2022: 1-9 - 2021
- [j15]Enkhtur Tsogbaatar, Monowar H. Bhuyan, Yuzo Taenaka, Doudou Fall, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT. Internet Things 14: 100391 (2021) - [c19]Javad Forough, Monowar H. Bhuyan, Erik Elmroth:
Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach. ARES 2021: 20:1-20:10 - [c18]Arezoo Hatefi, Xuan-Son Vu, Monowar H. Bhuyan, Frank Drewes:
Cformer: Semi-Supervised Text Clustering Based on Pseudo Labeling. CIKM 2021: 3078-3082 - [c17]Cheikh Saliou Mbacke Babou, Doudou Fall, Shigeru Kashihara, Yuzo Taenaka, Monowar H. Bhuyan, Ibrahima Niang, Ibrahima Diané, Youki Kadobayashi:
D-LBAH: Dynamic Load Balancing Algorithm for HEC-SDN systems. FiCloud 2021: 304-310 - [c16]Sourasekhar Banerjee, Erik Elmroth, Monowar H. Bhuyan:
Fed-FiS: a Novel Information-Theoretic Federated Feature Selection for Learning Stability. ICONIP (5) 2021: 480-487 - [c15]Enkhtur Tsogbaatar, Monowar H. Bhuyan, Doudou Fall, Yuzo Taenaka, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
A 1D-CNN Based Deep Learning for Detecting VSI-DDoS Attacks in IoT Applications. IEA/AIE (1) 2021: 530-543 - 2020
- [j14]Cheikh Saliou Mbacke Babou, Doudou Fall, Shigeru Kashihara, Yuzo Taenaka, Monowar H. Bhuyan, Ibrahima Niang, Youki Kadobayashi:
Hierarchical Load Balancing and Clustering Technique for Home Edge Computing. IEEE Access 8: 127593-127607 (2020) - [c14]Sourasekhar Banerjee, Rajiv Misra, Mukesh Prasad, Erik Elmroth, Monowar H. Bhuyan:
Multi-diseases Classification from Chest-X-ray: A Federated Deep Learning Approach. Australasian Conference on Artificial Intelligence 2020: 3-15 - [c13]Ayush Agarwal, Aneesh Sreevallabh Chivukula, Monowar H. Bhuyan, Tony Jan, Bhuva Narayan, Mukesh Prasad:
Identification and Classification of Cyberbullying Posts: A Recurrent Neural Network Approach Using Under-Sampling and Class Weighting. ICONIP (5) 2020: 113-120 - [c12]Tobias Sundqvist, Monowar H. Bhuyan, Johan Forsman, Erik Elmroth:
Boosted Ensemble Learning for Anomaly Detection in 5G RAN. AIAI (1) 2020: 15-30 - [c11]Enkhtur Tsogbaatar, Monowar H. Bhuyan, Yuzo Taenaka, Doudou Fall, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
SDN-Enabled IoT Anomaly Detection Using Ensemble Learning. AIAI (2) 2020: 268-280 - [c10]Ahlam Alnefaie, Deepak Gupta, Monowar H. Bhuyan, Imran Razzak, Prashant Gupta, Mukesh Prasad:
End-to-End Analysis for Text Detection and Recognition in Natural Scene Images. IJCNN 2020: 1-8
2010 – 2019
- 2019
- [c9]Monowar H. Bhuyan, Maode Ma, Youki Kadobayashi, Erik Elmroth:
Information-Theoretic Ensemble Learning for DDoS Detection with Adaptive Boosting. ICTAI 2019: 995-1002 - [c8]Pratyush Kr. Deka, Monowar H. Bhuyan, Youki Kadobayashi, Erik Elmroth:
Adversarial Impact on Anomaly Detection in Cloud Datacenters. PRDC 2019: 188-197 - [c7]Roshmi Sarmah, Manasjyoti Bhuyan, Monowar H. Bhuyan:
SURE-H: A Secure IoT Enabled Smart Home System. WF-IoT 2019: 59-63 - 2018
- [c6]Monowar H. Bhuyan, Erik Elmroth:
Multi-scale Low-Rate DDoS Attack Detection Using the Generalized Total Variation Metric. ICMLA 2018: 1040-1047 - 2017
- [b1]Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Network Traffic Anomaly Detection and Prevention - Concepts, Techniques, and Tools. Computer Communications and Networks, Springer 2017, ISBN 978-3-319-65186-6, pp. 1-257 - 2016
- [j13]Arindom Ain, Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation. Int. J. Netw. Secur. 18(3): 474-480 (2016) - [j12]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
A multi-step outlier-based anomaly detection approach to network-wide traffic. Inf. Sci. 348: 243-271 (2016) - [j11]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric. Secur. Commun. Networks 9(16): 3251-3270 (2016) - [c5]S. Choudhury, A. Kalwar, A. Goswami, Monowar H. Bhuyan:
BRC-KEP: A secure biometric and reversible CA based 2-party key exchange protocol. IC3 2016: 1-6 - 2015
- [j10]Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Towards Generating Real-life Datasets for Network Intrusion Detection. Int. J. Netw. Secur. 17(6): 683-701 (2015) - [j9]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recognit. Lett. 51: 1-7 (2015) - 2014
- [j8]Monowar Hussain Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Towards an Unsupervised Method for Network Anomaly Detection in Large Datasets. Comput. Informatics 33(1): 1-34 (2014) - [j7]Monowar H. Bhuyan, Hirak Jyoti Kashyap, Dhruba Kumar Bhattacharyya, Jugal K. Kalita:
Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions. Comput. J. 57(4): 537-556 (2014) - [j6]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
Network Anomaly Detection: Methods, Systems and Tools. IEEE Commun. Surv. Tutorials 16(1): 303-336 (2014) - [j5]Nazrul Hoque, Monowar H. Bhuyan, Ram Charan Baishya, D. K. Bhattacharyya, Jugal K. Kalita:
Network attacks: Taxonomy, tools and systems. J. Netw. Comput. Appl. 40: 307-324 (2014) - [c4]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
Information metrics for low-rate DDoS attack detection: A comparative evaluation. IC3 2014: 80-84 - 2012
- [j4]Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach. Int. J. Netw. Secur. 14(6): 339-351 (2012) - [c3]Prasanta Gogoi, Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
Packet and Flow Based Network Intrusion Dataset. IC3 2012: 322-334 - [c2]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
An effective unsupervised network anomaly detection method. ICACCI 2012: 533-539 - [i3]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
Survey on Incremental Approaches for Network Anomaly Detection. CoRR abs/1211.4493 (2012) - [i2]Monowar H. Bhuyan, D. K. Bhattacharyya:
An Effective Fingerprint Classification and Search Method. CoRR abs/1211.4503 (2012) - [i1]Monowar H. Bhuyan, Sarat Saharia, Dhruba K. Bhattacharyya:
An Effective Method for Fingerprint Classification. CoRR abs/1211.4658 (2012) - 2011
- [j3]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
Surveying Port Scans and Their Detection Methodologies. Comput. J. 54(10): 1565-1581 (2011) - [j2]Monowar Hussain Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Survey on Incremental Approaches for Network Anomaly Detection. Int. J. Commun. Networks Inf. Secur. 3(3) (2011) - [c1]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
NADO: network anomaly detection using outlier approach. ICCCS 2011: 531-536 - 2010
- [j1]Monowar Hussain Bhuyan, Sarat Saharia, Dhruba K. Bhattacharyya:
An Effective Method for Fingerprint Classification. Int. Arab. J. e Technol. 1(3): 89-97 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint