Author of the publication

Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points.

, , , and . APNOMS, volume 5787 of Lecture Notes in Computer Science, page 385-394. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks., , and . EURASIP J. Wireless Comm. and Networking, (2013)Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis., , , , , and . Peer-to-Peer Netw. Appl., 8 (4): 716-732 (2015)Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments., , , and . AINA Workshops, page 726-731. IEEE Computer Society, (2012)Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators., , , , , and . VIETCRYPT, volume 4341 of Lecture Notes in Computer Science, page 260-270. Springer, (2006)Cryptanalysis of block cipher Piccolo suitable for cloud computing.. J. Supercomput., 66 (2): 829-840 (2013)Update on SEED: SEED-192/256., , , , , , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 1-10. Springer, (2009)Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points., , , and . APNOMS, volume 5787 of Lecture Notes in Computer Science, page 385-394. Springer, (2009)HIGHT: A New Block Cipher Suitable for Low-Resource Device., , , , , , , , , and 3 other author(s). CHES, volume 4249 of Lecture Notes in Computer Science, page 46-59. Springer, (2006)Security analysis of the SCO-family using key schedules., , , and . Inf. Sci., 179 (24): 4232-4242 (2009)Improved Differential Fault Analysis on ARIA using Small Number of Faults., , , and . IACR Cryptology ePrint Archive, (2013)