Author of the publication

A cloud/edge computing streaming system for network traffic monitoring and threat detection.

, , , , and . Int. J. Secur. Networks, 13 (3): 169-186 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A cloud computing based system for cyber security management., , , , , , and . Int. J. Parallel Emergent Distributed Syst., 30 (1): 29-45 (2015)Post-fabrication trimming of silicon photonic circuits by femtosecond laser pulses., , , , and . OFC, page 1-3. IEEE, (2016)A cloud computing based architecture for cyber security situation awareness., , , and . CNS, page 488-492. IEEE, (2013)A cloud/edge computing streaming system for network traffic monitoring and threat detection., , , , and . Int. J. Secur. Networks, 13 (3): 169-186 (2018)A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures., , , , , , and . Big Data Res., (2016)Pattern Discovery and Anomaly Detection via Knowledge Graph., , , , , and . FUSION, page 2392-2399. IEEE, (2018)A streaming-based network monitoring and threat detection system., , , , and . SERA, page 31-37. IEEE Computer Society, (2016)Comprehensive Evaluation of an Educational Information Management Solution for Parents: MyStudentScope., , , and . HCI (4), volume 12184 of Lecture Notes in Computer Science, page 250-264. Springer, (2020)A threat monitoring system in enterprise networks with smart mobiles., , , , , , and . Int. J. Secur. Networks, 11 (1/2): 66-81 (2016)Multi-agent DDPG Enpowered UAV Trajectory Optimization for Computation Task Offloading., , and . ICCT, page 608-612. IEEE, (2022)