Author of the publication

A Novel Visualization Method for Detecting DDoS Network Attacks.

, , , , and . VINCI, page 185-194. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tensor mutual information and its applications., , , , and . Concurr. Comput. Pract. Exp., (2022)Exploring UDDI Registries Using Modified OFDAV Browser., and . SEKE, page 119-123. (2003)A New Word-Intersection Clustering Method for Information Filtering., , and . ICETE (1), page 241-244. INSTICC Press, (2004)WeBeVis: analyzing user web behavior through visual metaphors., , , , , and . Sci. China Inf. Sci., 56 (5): 1-15 (2013)Interactive Data Exploration through Multiple Visual Contexts with Different Data Models and Dimensions., , and . IV, page 84-89. IEEE Computer Society, (2017)Drawing Large Weighted Graphs Using Clustered Force-Directed Algorithm., , and . IV, page 13-17. IEEE Computer Society, (2014)A Fast Algorithm for Balanced Graph Clustering., and . IV, page 46-52. IEEE Computer Society, (2007)A Space-Filling Multidimensional Visualization (SFMDVis for Exploratory Data Analysis., , , and . VINCI, page 19. ACM, (2014)TreemapBar: Visualizing Additional Dimensions of Data in Bar Chart., , and . IV, page 98-103. IEEE Computer Society, (2009)Visual Analytics of Clinical and Genetic Datasets of Acute Lymphoblastic Leukaemia., , , , , and . ICONIP (1), volume 7062 of Lecture Notes in Computer Science, page 113-120. Springer, (2011)