Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online classification of user activities using machine learning on network traffic., , , and . Comput. Networks, (2020)The effect of burst formation timers on video streaming over optical burst switched networks., , , and . BROADNETS, page 282-289. IEEE, (2008)Duplicate detection methodology for IP network traffic analysis., , , and . M&N, page 161-166. IEEE, (2013)Network monitoring for energy efficiency in large-scale networks: the case of the Spanish Academic Network., , , , , , , and . J. Supercomput., 62 (3): 1284-1304 (2012)Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic., , , and . CoRR, (2022)Strategies for the interconnection of heterogeneous optical networks., , , , , , , , , and 1 other author(s). ICTON, page 1-4. IEEE, (2014)Evaluation of RTT as an Estimation of Interactivity Time for QoE Evaluation in Remote Desktop Environments., , , and . ITNAC, page 240-245. IEEE, (2023)KISS Methodologies for Network Management and Anomaly Detection., , and . SoftCOM, page 1-6. IEEE, (2018)A protocol-adaptive monitoring tree for efficient design of traffic monitoring probes., , and . Comput. Networks, 42 (4): 461-479 (2003)KISS methodologies for network management and anomaly detection., , and . CoRR, (2019)