Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving PCA-based anomaly detection by using multiple time scale analysis and Kullback-Leibler divergence., , , , and . Int. J. Commun. Syst., 27 (10): 1731-1751 (2014)Security and delay issues in SIP systems., , , and . Int. J. Commun. Syst., 22 (8): 1023-1044 (2009)A Behavioral Study of TCP Linux Variants over Satellite Networks., , , , and . SAINT, page 474-479. IEEE Computer Society, (2011)Statistical Network Anomaly Detection: An Experimental Study., , and . FNSS, volume 670 of Communications in Computer and Information Science, page 12-25. (2016)Combining wavelet analysis and CUSUM algorithm for network anomaly detection., , , and . ICC, page 1091-1095. IEEE, (2012)Distributed and Centralized Path Computation Algorithms: Implementation in NS2 and Performance Comparison., , , and . ICC, page 17-21. IEEE, (2008)Application of Wavelet Packet Transform to Network Anomaly Detection., , and . NEW2AN, volume 5174 of Lecture Notes in Computer Science, page 246-257. Springer, (2008)Path computation algorithms in NS2., , , and . SimuTools, page 54. ICST/ACM, (2008)An open hardware implementation of CUSUM based network anomaly detection., , and . GLOBECOM, page 2760-2765. IEEE, (2012)New statistical approaches for anomaly detection., , and . Secur. Commun. Networks, 2 (6): 611-634 (2009)