Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DNS-IDS: Securing DNS in the Cloud Era., , , and . ICCAC, page 296-301. IEEE Computer Society, (2015)IEEE 802.11 anomaly-based behavior analysis., , and . ICNC, page 369-373. IEEE Computer Society, (2013)AdaBoost-based sensor fusion for credibility assessment., , and . ISI, page 224-226. IEEE, (2012)Anomaly Behavior Analysis of DNS Protocol., , , and . J. Internet Serv. Inf. Secur., 5 (4): 85-97 (2015)Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis., , , and . IEEE Trans. Inf. Forensics Secur., 10 (10): 2158-2170 (2015)An Anomaly Behavior Analysis Methodology for Network Centric Systems.. University of Arizona, Tucson, USA, (2013)base-search.net (ftunivarizona:oai:arizona.openrepository.com:10150/305804).