Anteneh Girma

Orcid: 0000-0002-1467-3738

According to our database1, Anteneh Girma authored at least 13 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cybersecurity and Electoral Processes. An Analysis of Block Chain Enabled Biometric Voter System and Risk Control in Kenya's 2022 Electoral Process and the United States Election System Infrastructure.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Artificial Intelligence Techniques for SQL Injection Attack Detection.
Proceedings of the 2023 8th International Conference on Intelligent Information Technology, 2023

2022
Analysis on the Importance of Securing Data to Prevent Political Polarization.
Proceedings of the Intelligent Systems and Applications, 2022

Mitigating IoT Enterprise Vulnerabilities Using Radio Frequency Security Architecture.
Proceedings of the Intelligent Systems and Applications, 2022

An Evaluation Framework for Machine Learning Methods in Detection of DoS and DDoS Intrusion.
Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication, 2022

Ransomware Attack Detection on the Internet of Things Using Machine Learning Algorithm.
Proceedings of the HCI International 2022 - Late Breaking Papers: Interacting with eXtended Reality and Artificial Intelligence, 2022

Securing Software Defining Network from Emerging DDoS Attack.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022

Identifying Shared Security Vulnerabilities and Mitigation Strategies at the Intersection of Application Programming Interfaces (APIs), Application-Level and Operating System (OS) of Mobile Devices.
Proceedings of the Future Technologies Conference, 2022

2015
Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment.
Proceedings of the 12th International Conference on Information Technology, 2015

Analysis of Security Vulnerabilities of Cloud Computing Environment Service Models and Its Main Characteristics.
Proceedings of the 12th International Conference on Information Technology, 2015

2014
Cloud Computing Vulnerability: DDoS as Its Main Security Threat, and Analysis of IDS as a Solution Model.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

2007
Research Directions in Quantum Cryptography.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2005
Impact Of External Security Measures On Data Access Implementation With Online Database Management System.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005


  Loading...