Author of the publication

Network Anomaly Detection by IP Flow Graph Analysis: A DDoS Attack Case Study.

, , , , and . SCCC, page 90-94. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BFASTDC: A Bitwise Algorithm for Mining Denial Constraints., and . DEXA (1), volume 11029 of Lecture Notes in Computer Science, page 53-68. Springer, (2018)Fast Algorithms for Denial Constraint Discovery., , and . Proc. VLDB Endow., 16 (4): 684-696 (2022)A Framework for Analyzing the Impact of Missing Data in Predictive Models., , , , and . CIKM, page 2209-2212. ACM, (2020)Anomaly Detection Using Forecasting Methods ARIMA and HWDS., , and . SCCC, page 63-66. IEEE Computer Society, (2013)Anomaly detection using the correlational paraconsistent machine with digital signatures of network segment., , , , and . Inf. Sci., (2017)Subset Modelling: A Domain Partitioning Strategy for Data-efficient Machine-Learning., , , , , , , and . SBBD, page 318-323. SBC, (2023)Anomaly detection using digital signature of network segment with adaptive ARIMA model and Paraconsistent Logic., , , and . ISCC, page 1-6. IEEE Computer Society, (2014)Mind Your Dependencies for Semantic Query Optimization., , , and . J. Inf. Data Manag., 9 (1): 3-19 (2018)Statistical, forecasting and metaheuristic techniques for network anomaly detection., , , , and . SAC, page 701-707. ACM, (2015)Discovery of Approximate (and Exact) Denial Constraints., , and . Proc. VLDB Endow., 13 (3): 266-278 (2019)