Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint characterization of the packet arrival and packet size processes of multifractal traffic based on stochastic L-systems, , and . (2003)Active Traffic Monitoring for Heterogeneous Environments., , , , , and . ICN (1), volume 3420 of Lecture Notes in Computer Science, page 603-610. Springer, (2005)Predicting QoS Characteristics on Wireless Networks., , and . ICNS, page 52. IEEE Computer Society, (2007)Accurate estimation of capacities and cross-traffic of all links in a path using ICMP timestamps., and . Telecommun. Syst., 33 (1-3): 89-115 (2006)Detection of Internet-wide traffic redirection attacks using machine learning techniques., , , , and . IET Networks, 12 (4): 179-195 (July 2023)Detection of Illicit Traffic using Neural Networks., , , and . SECRYPT, page 5-12. INSTICC Press, (2008)Detection of Outliers Using Robust Principal Component Analysis: A Simulation Study., , , and . SMPS, volume 77 of Advances in Intelligent and Soft Computing, page 499-507. Springer, (2010)Robust feature selection and robust PCA for internet traffic anomaly detection., , , , , and . INFOCOM, page 1755-1763. IEEE, (2012)Detecting Internet-Scale Traffic Redirection Attacks Using Latent Class Models., , , , and . SoCPaR, volume 942 of Advances in Intelligent Systems and Computing, page 370-380. Springer, (2018)Anomaly detection of Internet traffic using robust feature selection based on kernel density estimation., , and . EuCNC, page 482-486. IEEE, (2015)