- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Advanced Malware Detection Techniques
- Anomaly Detection Techniques and Applications
- Network Packet Processing and Optimization
- Tendon Structure and Treatment
- Skin and Cellular Biology Research
- Autoimmune Bullous Skin Diseases
- Cryptography and Data Security
- Security and Verification in Computing
- Cloud Data Security Solutions
Royan Institute
2023
Academic Center for Education, Culture and Research
2023
Queen's University
2014-2022
Abstract Machine learning has become the standard solution to problems in many areas, such as image recognition, natural language processing, and spam detection. In area of network intrusion detection, machine techniques have also been successfully used detect anomalies traffic. However, there is less tolerance detection domain terms errors, especially false positives. this paper, we define strict acceptance criteria, show that only very few ensemble classifiers are able meet them detecting...
As the Cloud is becoming more ubiquitous and less expensive to utilize, a new class of denial service attacks emerging. These employ launch against target outside Cloud. Slow-read can be one those attacks. It type application-layer that exploits vulnerabilities in HTTP protocol order make services inaccessible for legitimate users on machine. This attack difficult detect by conventional intrusion detection systems, as it generates complete packets all networking layers slow rate. The...
Objectives: This clinical research aimed to establish autologous fibroblasts transplantation as a possible treatment for patients with DEJ. The COL7A1 gene expression was also evaluated.
 Methods: Six (3M and 3F), 4 no recurrent wounds 2 after surgery, 15 healthy subjects were included in the study controls. Quantitative real-time polymerase chain reaction (real-time PCR) analysis of performed using an oligonucleotide primer pair designed amplify across exon/exon junction.
...