Anteneh Girma
Orcid: 0000-0002-1467-3738
According to our database1,
Anteneh Girma
authored at least 13 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Cybersecurity and Electoral Processes. An Analysis of Block Chain Enabled Biometric Voter System and Risk Control in Kenya's 2022 Electoral Process and the United States Election System Infrastructure.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023
Proceedings of the 2023 8th International Conference on Intelligent Information Technology, 2023
2022
Proceedings of the Intelligent Systems and Applications, 2022
Mitigating IoT Enterprise Vulnerabilities Using Radio Frequency Security Architecture.
Proceedings of the Intelligent Systems and Applications, 2022
An Evaluation Framework for Machine Learning Methods in Detection of DoS and DDoS Intrusion.
Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication, 2022
Ransomware Attack Detection on the Internet of Things Using Machine Learning Algorithm.
Proceedings of the HCI International 2022 - Late Breaking Papers: Interacting with eXtended Reality and Artificial Intelligence, 2022
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022
Identifying Shared Security Vulnerabilities and Mitigation Strategies at the Intersection of Application Programming Interfaces (APIs), Application-Level and Operating System (OS) of Mobile Devices.
Proceedings of the Future Technologies Conference, 2022
2015
Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment.
Proceedings of the 12th International Conference on Information Technology, 2015
Analysis of Security Vulnerabilities of Cloud Computing Environment Service Models and Its Main Characteristics.
Proceedings of the 12th International Conference on Information Technology, 2015
2014
Cloud Computing Vulnerability: DDoS as Its Main Security Threat, and Analysis of IDS as a Solution Model.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014
2007
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
2005
Impact Of External Security Measures On Data Access Implementation With Online Database Management System.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005