Author of the publication

Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection.

, , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 439-446. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On traffic prediction for resource allocation: A Chebyshev bound based allocation scheme., , , and . Comput. Commun., 31 (16): 3741-3751 (2008)Combining sketches and wavelet analysis for multi time-scale network anomaly detection., , , and . Comput. Secur., 30 (8): 692-704 (2011)On the implications of the off periods distribution in two-state traffic models., , , and . IEEE Commun. Lett., 3 (7): 220-222 (1999)Two-Phase Resource Queueing System with Requests Duplication and Renewal Arrival Process., , , and . DCCN, volume 12563 of Lecture Notes in Computer Science, page 350-364. Springer, (2020)A Novel Auction Based Scheduling Algorithm in Industrial Internet of Things Networks., , , and . CN, volume 860 of Communications in Computer and Information Science, page 103-114. Springer, (2018)Detecting Heavy Change in the Heavy Hitter distribution of network traffic., , , and . IWCMC, page 1298-1303. IEEE, (2011)Impact of Histogram Construction Techniques on Information - Theoretic Anomaly Detection., , and . CN, volume 718 of Communications in Computer and Information Science, page 154-165. Springer, (2017)NS2 Extensions for the Simulation of RDM and G-RDM in DS-TE Networks., , , and . ICC, page 1-5. IEEE, (2010)A Novel PCA-Based Network Anomaly Detection., , , , and . ICC, page 1-5. IEEE, (2011)Class-based traffic recovery with load balancing in software-defined networks., , , and . GLOBECOM Workshops, page 161-165. IEEE, (2014)