Pheeha Machaka

Orcid: 0000-0003-4251-7318

According to our database1, Pheeha Machaka authored at least 10 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Modelling DDoS Attacks in IoT Networks Using Machine Learning.
Proceedings of the Emerging Technologies for Developing Countries, 2022

2021
Modelling DDoS Attacks in IoT Networks using Machine Learning.
CoRR, 2021

A Reference Point for Designing a Cybersecurity Curriculum for Universities.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

2015
Using the Cumulative Sum Algorithm Against Distributed Denial of Service Attacks in Internet of Things.
Proceedings of the Context-Aware Systems and Applications - 4th International Conference, 2015

2014
An Investigation of Scalable Anomaly Detection Techniques for a Large Network of Wi-Fi Hotspots.
Proceedings of the Scalable Information Systems - 5th International Conference, 2014

2013
Drought Monitoring: A Performance Investigation of Three Machine Learning Techniques.
Proceedings of the Context-Aware Systems and Applications, 2013

2012
A highly scalable monitoring tool for Wi-Fi networks.
Proceedings of the 1st International IEEE Symposium on Wireless Systems, 2012

2011
Preemptive Performance Monitoring of a Large Network of Wi-Fi Hotspots: An Artificial Immune System.
Proceedings of the Wired/Wireless Internet Communications, 2011

Monitoring of a Large Wi-Fi Hotspots Network: Performance Investigation of Soft Computing Techniques.
Proceedings of the Bio-Inspired Models of Networks, Information, and Computing Systems, 2011

A Comparative Evaluation of Business Intelligence Technologies with Application to Product Profiling.
Proceedings of the Bio-Inspired Models of Networks, Information, and Computing Systems, 2011


  Loading...