Author of the publication

Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection.

, , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 439-446. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure and privacy-preserving approach to communications in smart grids., , , and . Int. J. Trust. Manag. Comput. Commun., 3 (3): 269-290 (2016)Security and delay issues in SIP systems., , , and . Int. J. Commun. Syst., 22 (8): 1023-1044 (2009)Design and Performance Evaluation of Service Overlay Networks Topologies., , , , and . J. Networks, 6 (4): 556-566 (2011)Improving PCA-based anomaly detection by using multiple time scale analysis and Kullback-Leibler divergence., , , , and . Int. J. Commun. Syst., 27 (10): 1731-1751 (2014)A Behavioral Study of TCP Linux Variants over Satellite Networks., , , , and . SAINT, page 474-479. IEEE Computer Society, (2011)Application of Wavelet Packet Transform to Network Anomaly Detection., , and . NEW2AN, volume 5174 of Lecture Notes in Computer Science, page 246-257. Springer, (2008)Distributed and Centralized Path Computation Algorithms: Implementation in NS2 and Performance Comparison., , , and . ICC, page 17-21. IEEE, (2008)Statistical Network Anomaly Detection: An Experimental Study., , and . FNSS, volume 670 of Communications in Computer and Information Science, page 12-25. (2016)Combining wavelet analysis and CUSUM algorithm for network anomaly detection., , , and . ICC, page 1091-1095. IEEE, (2012)Path computation algorithms in NS2., , , and . SimuTools, page 54. ICST/ACM, (2008)