Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving PCA-based anomaly detection by using multiple time scale analysis and Kullback-Leibler divergence., , , , and . Int. J. Commun. Syst., 27 (10): 1731-1751 (2014)Security and delay issues in SIP systems., , , and . Int. J. Commun. Syst., 22 (8): 1023-1044 (2009)A secure and privacy-preserving approach to communications in smart grids., , , and . Int. J. Trust. Manag. Comput. Commun., 3 (3): 269-290 (2016)Design and Performance Evaluation of Service Overlay Networks Topologies., , , , and . J. Networks, 6 (4): 556-566 (2011)A Behavioral Study of TCP Linux Variants over Satellite Networks., , , , and . SAINT, page 474-479. IEEE Computer Society, (2011)Combining wavelet analysis and CUSUM algorithm for network anomaly detection., , , and . ICC, page 1091-1095. IEEE, (2012)Distributed and Centralized Path Computation Algorithms: Implementation in NS2 and Performance Comparison., , , and . ICC, page 17-21. IEEE, (2008)Application of Wavelet Packet Transform to Network Anomaly Detection., , and . NEW2AN, volume 5174 of Lecture Notes in Computer Science, page 246-257. Springer, (2008)Statistical Network Anomaly Detection: An Experimental Study., , and . FNSS, volume 670 of Communications in Computer and Information Science, page 12-25. (2016)Path computation algorithms in NS2., , , and . SimuTools, page 54. ICST/ACM, (2008)