Author of the publication

Applicaion-level traffic analysis of smartphone users using embedded agents.

, and . APNOMS, page 1-4. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Android malware detection using multivariate time-series technique., and . APNOMS, page 198-202. IEEE, (2015)A method for service identification of SSL/TLS encrypted traffic with the relation of session ID and Server IP., , , , and . APNOMS, page 487-490. IEEE, (2015)Applicaion-level traffic analysis of smartphone users using embedded agents., and . APNOMS, page 1-4. IEEE, (2012)OMA DM-based remote software fault management for mobile devices., , , , and . Int. J. Netw. Manag., 19 (6): 491-511 (2009)Experimental Comparison of Hybrid Sampling Methods for an Efficient NIDS., , and . APNOMS, page 1-4. IEEE, (2022)Interaction Translation Methods for XML/SNMP Gateway., , , and . DSOM, volume 2506 of Lecture Notes in Computer Science, page 54-65. Springer, (2002)Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection., , , , , and . Secur. Commun. Networks, (2017)An approach for failure recognition in IP-based industrial control networks and systems., , , and . Int. J. Netw. Manag., 22 (6): 477-493 (2012)Automatic Configuration for VPN Using Active XML., and . IPOM, volume 3751 of Lecture Notes in Computer Science, page 173-180. Springer, (2005)Autonomic Resilient Internet-of-Things(IoT)Management., , and . CoRR, (2015)