Author of the publication

A BRPCA Based Approach for Anomaly Detection in Mobile Networks.

, , , , , and . ISCIS, volume 363 of Lecture Notes in Electrical Engineering, page 115-125. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feasibility of Signaling Storms in 3G/UMTS Operational Networks., , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 187-198. (2015)Packets travelling in non-homogeneous networks., and . MSWiM, page 361-368. ACM, (2011)Detection and mitigation of signaling storms in mobile networks., , and . ICNC, page 1-5. IEEE Computer Society, (2016)Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach., , , and . ISCIS, volume 264 of Lecture Notes in Electrical Engineering, page 429-438. Springer, (2013)A Data Plane Approach for Detecting Control Plane Anomalies in Mobile Networks., and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 210-221. (2015)Fast message dissemination for emergency communications., , , and . PerCom Workshops, page 370-375. IEEE Computer Society, (2010)Storms in mobile networks., , and . Q2SWinet, page 119-126. ACM, (2014)Queueing performance under Network Coding., and . ITW, page 135-139. IEEE, (2009)A Low-latency and Self-adapting Application Layer Multicast., , and . ISCIS, volume 62 of Lecture Notes in Electrical Engineering, page 169-172. Springer, (2010)Performance Trade-Offs in a Network Coding Router., and . ICCCN, page 1-6. IEEE, (2010)