Author of the publication

DDoS flooding attack detection through a step-by-step investigation.

, , and . NESEA, page 1-5. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conditional Log-linear Structures for Log-linear Modelling.. Modelling, Identification and Control, page 477-482. IASTED/ACTA Press, (2003)Enhanced Dual-Active-Bridge DC-DC Converter for Balancing Bipolar Voltage Level of DC Distribution System., , and . IEEE Trans. Ind. Electron., 67 (12): 10399-10409 (2020)How a firm's position in a whole network affects innovation performance.. Technol. Anal. Strateg. Manag., 31 (2): 155-168 (2019)A Short Note on Improvement of Agreement Rate., and . J. Classif., 37 (3): 550-557 (2020)An Optimal Algorithm for Finding the Edge Visibility Polygon under Limited Visibility., , , , and . Inf. Process. Lett., 53 (6): 359-365 (1995)DDoS attack detection by using packet sampling and flow features., , and . SAC, page 711-712. ACM, (2014)Performance Analysis of MAC Protocol for EPON Using OPNET., , , and . Human.Society@Internet 2003, volume 2713 of Lecture Notes in Computer Science, page 656-661. Springer, (2003)High-voltage input power supply for modular multi-level converter., , and . AIM, page 1690-1693. IEEE, (2015)Analysis on time-delay of commercial off-the-shelf vision system considering motion-blur., and . IROS, page 2080-2085. IEEE, (2001)Development of heat generating system based on small wind turbine system., , and . SCIS&ISIS, page 1209-1212. IEEE, (2014)