Author of the publication

Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic.

, , , , and . Comput. J., 55 (6): 740-755 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approaches for optimizing virtual machine placement and migration in cloud environments: A survey., , , and . J. Parallel Distributed Comput., (2018)Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic., , , , and . Comput. J., 55 (6): 740-755 (2012)A tool for estimating the hurst parameter and for generating self-similar sequences., , , , and . SummerSim, page 40. SCS/ ACM, (2014)Security issues in cloud environments: a survey., , , , and . Int. J. Inf. Sec., 13 (2): 113-170 (2014)A Complete Review on the Application of Statistical Methods for Evaluating Internet Traffic Usage., , , , and . IEEE Access, (2022)Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework., , , , , , and . Comput. Networks, (2021)How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses., , , and . CoRR, (2023)Improving software maintenance with improved bug triaging., , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 8757-8764 (2022)Theoretical and practical assessments over SSH., , , , , and . Res. Pract. Technol. Enhanc. Learn., (2023)Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean Distance., , , , and . AINA, volume 1151 of Advances in Intelligent Systems and Computing, page 883-897. Springer, (2020)