Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Signature of Network Segment using PCA, ACO and Holt-Winters for network management., , , , and . Healthcom, page 564-568. IEEE, (2013)Artificial Immune Systems and Fuzzy Logic to Detect Flooding Attacks in Software-Defined Networks., , , and . IEEE Access, (2020)Fast Defense System Against Attacks in Software Defined Networks., , , , , and . IEEE Access, (2018)Digital Signature of Network Segment Using Flow Analysis through Genetic Algorithm and ACO Metaheuristics., , and . SCCC, page 92-97. IEEE Computer Society, (2014)Ant Colony Optimization for Creating Digital Signature of Network Segments Using Flow Analysis., , , and . SCCC, page 171-180. IEEE Computer Society, (2012)Generative Adversarial Network Models for Anomaly Detection in Software-Defined Networks., , , , and . J. Netw. Syst. Manag., 32 (4): 93 (October 2024)Statistical, forecasting and metaheuristic techniques for network anomaly detection., , , , and . SAC, page 701-707. ACM, (2015)Correlational paraconsistent machine for anomaly detection., , , , and . GLOBECOM, page 551-556. IEEE, (2014)Holt-Winters statistical forecasting and ACO metaheuristic for traffic characterization., , , and . ICC, page 2524-2528. IEEE, (2013)A novel anomaly detection system to assist network management in SDN environment., , , , and . ICC, page 1-6. IEEE, (2017)