Author of the publication

Network Anomaly Detection by IP Flow Graph Analysis: A DDoS Attack Case Study.

, , , , and . SCCC, page 90-94. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of a System for Collecting and Analyzing Public and Open Access Information from Brazilian Federal Legislative Houses., and . SoCPaR, volume 1383 of Advances in Intelligent Systems and Computing, page 75-84. Springer, (2020)Evaluation of quality in encrypted VoIP calls., , , , and . CASoN, page 175-180. IEEE, (2012)Integrated system architecture for decision-making and urban planning in smart cities., , and . IJDSN, (2019)Anomaly Detection Aiming Pro-Active Management of Computer Network Based on Digital Signature of Network Segment., , and . LANOMS, page 53-64. UFRGS, (2005)Assessing some models for city e-government implementation: a case study., , and . Electron. Gov. an Int. J., 12 (1): 86-105 (2016)On the Determination of Epsilon during Discriminative GMM Training., , , , , , , , , and . ISM, page 362-364. IEEE Computer Society, (2010)Metrics Application in Metropolitan Broadband Access Network Security Analysis., , , and . SECRYPT, page 473-476. INSTICC Press, (2008)Unsupervised learning clustering and self-organized agents applied to help network management., , , and . Expert Syst. Appl., (2016)Self-organizing Maps - An Approach Applied to the Electronic Government., , , and . WEBIST, page 461-470. SciTePress, (2012)New Approaches for XML Data Compression., , , , and . WEBIST, page 233-237. SciTePress, (2012)