Author of the publication

DDoS flooding attack detection through a step-by-step investigation.

, , and . NESEA, page 1-5. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conditional Log-linear Structures for Log-linear Modelling.. Modelling, Identification and Control, page 477-482. IASTED/ACTA Press, (2003)Analysis on time-delay of commercial off-the-shelf vision system considering motion-blur., and . IROS, page 2080-2085. IEEE, (2001)High-voltage input power supply for modular multi-level converter., , and . AIM, page 1690-1693. IEEE, (2015)Development of heat generating system based on small wind turbine system., , and . SCIS&ISIS, page 1209-1212. IEEE, (2014)How a firm's position in a whole network affects innovation performance.. Technol. Anal. Strateg. Manag., 31 (2): 155-168 (2019)Enhanced Dual-Active-Bridge DC-DC Converter for Balancing Bipolar Voltage Level of DC Distribution System., , and . IEEE Trans. Ind. Electron., 67 (12): 10399-10409 (2020)A Short Note on Improvement of Agreement Rate., and . J. Classif., 37 (3): 550-557 (2020)An Optimal Algorithm for Finding the Edge Visibility Polygon under Limited Visibility., , , , and . Inf. Process. Lett., 53 (6): 359-365 (1995)Performance Analysis of MAC Protocol for EPON Using OPNET., , , and . Human.Society@Internet 2003, volume 2713 of Lecture Notes in Computer Science, page 656-661. Springer, (2003)Analysis and Design of a Multioutput Converter Using Asymmetrical PWM Half-Bridge Flyback Converter Employing a Parallel-Series Transformer., , , and . IEEE Trans. Ind. Electron., 60 (8): 3115-3125 (2013)