default search action
M. Rahamatullah Khondoker
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]L. Kavisankar, Ajay Vemuri, S. Venkatesan, Rahamatullah Khondoker:
A Novel Strategy for the Identification of the Operating System of Bluetooth-Enabled Devices for Security Audit. IOTSMS 2024: 50-57 - 2023
- [c19]Md. Zahirul Islam, Md. Abdur Rahim, Md. Salahuddin, Syed Md. Galib, Rahamatullah Khondoker:
An Expert Survey for the Evaluation of 5G Adoption in Bangladesh. AINA (3) 2023: 446-457 - [c18]Sharmin Akter Mim, Roksana Rahman, Md. Rashid Al Asif, Khondokar Fida Hasan, Rahamatullah Khondoker:
Cybersecurity Attacks and Vulnerabilities During COVID-19. AINA (3) 2023: 532-545 - [c17]Uphar Singh, Deepak Gajjala, Rahamatullah Khondoker, Harshit Gupta, Ayush Sinha, O. P. Vyas:
Anomaly Classification to Enable Self-healing in Cyber Physical Systems Using Process Mining. LION 2023: 1-15 - [i4]Kumar Saurabh, Deepak Gajjala, Krishna Kaipa, Ranjana Vyas, O. P. Vyas, Rahamatullah Khondoker:
TMAP: A Threat Modeling and Attack Path Analysis Framework for Industrial IoT Systems (A Case Study of IoM and IoP). CoRR abs/2312.15319 (2023) - 2022
- [j7]Nadera Sultana Tany, Sunish Suresh, Durgesh Nandan Sinha, Chinmay Shinde, Cristina Stolojescu-Crisan, Rahamatullah Khondoker:
Cybersecurity Comparison of Brain-Based Automotive Electrical and Electronic Architectures. Inf. 13(11): 518 (2022) - [c16]Kumar Saurabh, Tanuj Kumar, Uphar Singh, O. P. Vyas, Rahamatullah Khondoker:
NFDLM: A Lightweight Network Flow based Deep Learning Model for DDoS Attack Detection in IoT Domains. AIIoT 2022: 736-742 - [c15]Kumar Saurabh, Saksham Sood, P. Aditya Kumar, Uphar Singh, Ranjana Vyas, O. P. Vyas, Rahamatullah Khondoker:
LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks. AIIoT 2022: 753-759 - [c14]Kumar Saurabh, Ayush Singh, Uphar Singh, O. P. Vyas, Rahamatullah Khondoker:
GANIBOT: A Network Flow Based Semi Supervised Generative Adversarial Networks Model for IoT Botnets Detection. COINS 2022: 1-5 - [i3]Md. Rashid Al Asif, Khondokar Fida Hasan, Md. Zahidul Islam, Rahamatullah Khondoker:
STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems. CoRR abs/2201.09493 (2022) - [i2]Kumar Saurabh, Saksham Sood, P. Aditya Kumar, Uphar Singh, Ranjana Vyas, O. P. Vyas, Rahamatullah Khondoker:
LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks. CoRR abs/2207.00424 (2022) - [i1]Kumar Saurabh, Tanuj Kumar, Uphar Singh, O. P. Vyas, Rahamatullah Khondoker:
NFDLM: A Lightweight Network Flow based Deep Learning Model for DDoS Attack Detection in IoT Domains. CoRR abs/2207.10803 (2022)
2010 – 2019
- 2017
- [j6]Daniel Schneider, Mario Trapp, Jörg Dörr, Sinisa Dukanovic, Thorsten Henkel, Rahamatullah Khondoker, Christoph Krauß, Sebastian Mauthofer, Dirk Scheuermann, Daniel Zelle:
Umfassende Sicherheit - Safety und Security im Kontext autonomer Systeme. Inform. Spektrum 40(5): 419-429 (2017) - [p1]Rahamatullah Khondoker, Pedro Larbig, Dirk Scheuermann, Frank G. Weber, Kpatcha M. Bayarou:
Addressing Industry 4.0 Security by Software-Defined Networking. Guide to Security in SDN and NFV 2017: 229-251 - 2016
- [b1]Rahamatullah Khondoker:
Description and Selection of Communication Services for Service Oriented Network Architectures. Kaiserslautern University of Technology, Germany, Springer Vieweg 2016, ISBN 978-3-658-12741-1, pp. 1-233 - [j5]Anupam Kumar Bairagi, Rahamatullah Khondoker, Rafiqul Islam:
An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures. Inf. Secur. J. A Glob. Perspect. 25(4-6): 197-212 (2016) - [j4]Neelam Dayal, Prasenjit Maity, Shashank Srivastava, Rahamatullah Khondoker:
Research Trends in Security and DDoS in SDN. Secur. Commun. Networks 9(18): 6386-6411 (2016) - [c13]Rahamatullah Khondoker, Pedro Larbig, Daniel Senf, Kpatcha M. Bayarou, Nils Gruschka:
AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks. NetSoft 2016: 347-348 - 2015
- [j3]Thomas Zinner, Tobias Hoßfeld, Markus Fiedler, Florian Liers, Thomas Volkert, Rahamatullah Khondoker, Raimund Schatz:
Requirement driven prospects for realizing user-centric network orchestration. Multim. Tools Appl. 74(2): 413-437 (2015) - [c12]Pascal Dauer, Rahamatullah Khondoker, Ronald Marx, Kpatcha M. Bayarou:
Security Analysis of Software Defined Networking Applications for Monitoring and Measurement: sFlow and BigTap. CFI 2015: 51-56 - 2014
- [j2]Rahamatullah Khondoker, Abbas Ali Siddiqui, Paul Müller, Kpatcha M. Bayarou:
Realization of Service-Orientation Paradigm in Network Architectures. J. ICT Stand. 1(3): 329-346 (2014) - [j1]Beny Nugraha, Rahamatullah Khondoker, Ronald Marx, Kpatcha M. Bayarou:
Detecting and Mitigating Repaying Attack in Expressive Internet Architecture (XIA). J. ICT Stand. 2(2): 151-186 (2014) - [c11]David Klingel, Rahamatullah Khondoker, Ronald Marx, Kpatcha M. Bayarou:
Security Analysis of Software Defined Networking Architectures: PCE, 4D and SANE. AINTEC 2014: 15 - [c10]Markus Tasch, Rahamatullah Khondoker, Ronald Marx, Kpatcha M. Bayarou:
Security Analysis of Security Applications for Software Defined Networks. AINTEC 2014: 23 - [c9]Rahamatullah Khondoker, Beny Nugraha, Ronald Marx, Kpatcha M. Bayarou:
Security of Selected Future Internet Architectures: A Survey. IMIS 2014: 433-440 - [c8]Beny Nugraha, Rahamatullah Khondoker, Ronald Marx, Kpatcha M. Bayarou:
A mutual key agreement protocol to mitigate replaying attack in eXpressive Internet Architecture (XIA). Kaleidoscope 2014: 233-240 - [c7]Adel Zaalouk, Rahamatullah Khondoker, Ronald Marx, Kpatcha M. Bayarou:
OrchSec: An orchestrator-based architecture for enhancing network-security using Network Monitoring and SDN Control functions. NOMS 2014: 1-9 - 2013
- [c6]Rahamatullah Khondoker, Paul Müller, Kpatcha M. Bayarou:
Selecting the best communication service in future network architectures. Kaleidoscope 2013: 1-8 - 2012
- [c5]M. Rahamatullah Khondoker, Abbas Ali Siddiqui, Bernd Reuther, Paul Müller:
Service Orientation Paradigm in Future Network Architectures. IMIS 2012: 346-351 - 2011
- [c4]Abbas Ali Siddiqui, M. Rahamatullah Khondoker, Bernd Reuther, Paul Müller, Christian Henke, Helge Backhaus:
Functional Composition and Its Challenges. IMIS 2011: 336-340 - [c3]Dennis Schwerdel, Daniel Günther, M. Rahamatullah Khondoker, Bernd Reuther, Paul Müller:
A building block interaction model for flexible future Internet architectures. NGI 2011: 1-8 - [c2]Rahamatullah Khondoker, Eric M. S. P. Veith, Paul Mueller:
A description language for communication services of future network architectures. NOF 2011: 68-75 - 2010
- [c1]Rahamatullah Khondoker, Bernd Reuther, Dennis Schwerdel, Abbas Ali Siddiqui, Paul Müller:
Describing and selecting communication services in a service oriented network architecture. Kaleidoscope 2010: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint