Author of the publication

Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using SOSS and FARIMA Models.

, , , and . IEEE Access, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network anomaly detection using a cross-correlation-based long-range dependence analysis., , , , and . Int. J. Netw. Manag., (2020)Analysis of P2P, IRC and HTTP traffic for botnets detection., , , and . Peer-to-Peer Netw. Appl., 11 (5): 848-861 (2018)Machine Learning Aided Blockchain Assisted Framework for Wireless Networks., , , , , and . IEEE Netw., 34 (5): 262-268 (2020)A robust anomaly detection method using a constant false alarm rate approach., , , , , , , and . Multim. Tools Appl., 79 (17-18): 12727-12750 (2020)Trusted UAV Network Coverage Using Blockchain, Machine Learning, and Auction Mechanisms., , , , , and . IEEE Access, (2020)Joint beamforming and admission control for cache-enabled Cloud-RAN with limited fronthaul capacity., , , , and . IET Signal Process., 14 (5): 278-287 (2020)Network traffic behavior analysis by decomposition into control and data planes., , , and . IPDPS, page 1-8. IEEE, (2008)Network traffic reduction and representation., , , and . Int. J. Sens. Networks, 33 (4): 239-249 (2020)Denial of service detection using dynamic time warping., , , , , and . Int. J. Netw. Manag., (2021)Countermeasures Against Adversarial Examples in Radio Signal Classification., , , , and . IEEE Wirel. Commun. Lett., 10 (8): 1830-1834 (2021)