Author of the publication

Digital Signature of Network Segment Using Flow Analysis through Genetic Algorithm and ACO Metaheuristics.

, , and . SCCC, page 92-97. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Signature of Network Segment Using Flow Analysis through Genetic Algorithm and ACO Metaheuristics., , and . SCCC, page 92-97. IEEE Computer Society, (2014)Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic., , , , and . Expert Syst. Appl., (2018)A Gated Recurrent Unit Deep Learning Model to Detect and Mitigate Distributed Denial of Service and Portscan Attacks., , , , , and . IEEE Access, (2022)Ant Colony Optimization for Creating Digital Signature of Network Segments Using Flow Analysis., , , and . SCCC, page 171-180. IEEE Computer Society, (2012)Digital Signature of Network Segment using PCA, ACO and Holt-Winters for network management., , , , and . Healthcom, page 564-568. IEEE, (2013)Artificial Immune Systems and Fuzzy Logic to Detect Flooding Attacks in Software-Defined Networks., , , and . IEEE Access, (2020)Fast Defense System Against Attacks in Software Defined Networks., , , , , and . IEEE Access, (2018)Unsupervised learning clustering and self-organized agents applied to help network management., , , and . Expert Syst. Appl., (2016)Digital Signature of Network Segment using Flow Analysis., , , , and . DCNET/ICE-B/OPTICS, page 35-40. SciTePress, (2012)A comprehensive survey on network anomaly detection., , , , and . Telecommun. Syst., 70 (3): 447-489 (2019)