Author of the publication

Traffic Pattern Analysis for Distributed Anomaly Detection.

, and . PPAM (2), volume 7204 of Lecture Notes in Computer Science, page 648-657. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling Social Network Evolution., , , , and . SocInfo, volume 6984 of Lecture Notes in Computer Science, page 283-286. Springer, (2011)Local Topology of Social Network Based on Motif Analysis., , and . KES (2), volume 5178 of Lecture Notes in Computer Science, page 97-105. Springer, (2008)Temporal Changes in Local Topology of an Email-Based Social Network., , , and . Comput. Informatics, 28 (6): 763-779 (2009)Structural Changes in an Email-Based Social Network., and . KES-AMSTA, volume 5559 of Lecture Notes in Computer Science, page 40-49. Springer, (2009)Dictionary as a Service - A Software Tool for Vocabulary Development and Maintenance., , , and . ISAT (2), volume 430 of Advances in Intelligent Systems and Computing, page 175-185. Springer, (2015)Complex Networks Monitoring and Security and Fraud Detection for Enterprises., and . WETICE, page 124-125. IEEE, (2019)Verifying Enterprise's Mandatory Access Control Policies with Coloured Petri Nets.. WETICE, page 184-189. IEEE Computer Society, (2003)Assessing the Uncertainty of Communication Patterns in Distributed Intrusion Detection System., and . KES (2), volume 4252 of Lecture Notes in Computer Science, page 243-250. Springer, (2006)Towards a Computational Framework for Modeling Semantic Interactions in Large Multiagent Communities.. KES (3), volume 4253 of Lecture Notes in Computer Science, page 1020-1026. Springer, (2006)A configurable service-based framework for composition, delivery and evaluation of composite web services in distributed QoS-aware ICT environment., , , and . Int. J. Cloud Comput., 2 (2/3): 258-272 (2013)