Author of the publication

Authentication anomaly detection: a case study on a virtual private network.

, , and . MineNet, page 17-22. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Admission Control for Short TCP Flows., and . GLOBECOM, page 1-6. IEEE, (2009)A Frame-Aggregation-Based Approach for Link Congestion Prediction in WiFi Video Streaming., , and . ICCCN, page 1-8. IEEE, (2020)Heterogeneous network approach to predict individuals' mental health., , , , , , and . CoRR, (2019)Exploring the potential in practice for opportunistic networks amongst smart mobile devices., and . MobiCom, page 315-326. ACM, (2013)Packet scheduling with delay and loss differentiation., and . Comput. Commun., 25 (1): 21-31 (2002)DSMCast: a scalable approach for DiffServ multicasting., and . Comput. Networks, 44 (6): 713-735 (2004)SEWS: A Channel-Aware Stall-Free WiFi Video Streaming Mechanism., and . NOSSDAV, page 67-72. ACM, (2018)Stealth Multicast: A Novel Catalyst for Network-Level Multicast Deployment.. NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 817-828. Springer, (2004)Jointly Predicting Job Performance, Personality, Cognitive Ability, Affect, and Well-Being., , , , , , , , , and 8 other author(s). IEEE Comput. Intell. Mag., 16 (2): 46-61 (2021)Differentiating Higher and Lower Job Performers in the Workplace Using Mobile Sensing., , , , , , , , , and 19 other author(s). Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (2): 37:1-37:24 (2019)