Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Denial of service detection using dynamic time warping., , , , , and . Int. J. Netw. Manag., (2021)Semi-Edge: From Edge Caching to Hierarchical Caching in Network Fog., , and . EdgeSys@MobiSys, page 43-48. ACM, (2018)Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systems., , , , and . ICC, page 1-7. IEEE, (2017)A look into the information your smartphone leaks., , , and . ISNCC, page 1-6. IEEE, (2017)Multi-Stage Attack Detection Using Contextual Information., , , , and . MILCOM, page 1-9. IEEE, (2018)Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats., , , , , , and . IEEE Access, (2019)A Live System for Wavelet Compression of High Speed Computer Network Measurements., and . PAM, volume 4427 of Lecture Notes in Computer Science, page 241-244. Springer, (2007)Detecting misbehaviour in WiFi using multi-layer metric data fusion., , and . M&N, page 155-160. IEEE, (2013)Anomaly-Based Network Intrusion Detection Using SVM., , , , , and . WCSP, page 1-6. IEEE, (2019)Anomaly Detection Using Dynamic Time Warping., , , , , and . CSE/EUC, page 193-198. IEEE, (2019)