Johnson Thomas
Publications by Year
Research Areas
Network Security and Intrusion Detection, Advanced Malware Detection Techniques, Mobile Ad Hoc Networks, Artificial Immune Systems Applications, Cloud Computing and Resource Management
Most-Cited Works
- → Modeling intrusion detection system using hybrid intelligent systems(2005)432 cited
- → D-SCIDS: Distributed soft computing intrusion detection system(2005)161 cited
- → Distributed Intrusion Detection Systems(2006)25 cited
- → Dynamic Workload Balancing for Hadoop MapReduce(2014)21 cited
- → Towards an efficient distributed cloud computing architecture(2016)15 cited
- → MAC-TCP cross-layer attack and its defense in cognitive radio networks(2014)8 cited
- Secure Directed Diffusion Routing Protocol for Sensor Networks using the LEAP Protocol(2006)
- → Game theoretic approach to resource provisioning in a distributed cloud(2014)7 cited
- → Improving Perceptual Multimedia Quality with an Adaptable Communication Protocol(2005)4 cited
- → <title>Mapping quality of perception to quality of service for a runtime-adaptable communication system</title>(1998)4 cited