Author of the publication

Enhancing immediacy of identification with multi-stage application identification.

, , , , and . NTMS, page 1-2. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic., , , , and . ICMLA (2), page 358-361. IEEE Computer Society, (2011)978-0-7695-4607-0.On Inferring Network Impact Factors by Decomposition of Mixed Distribution., , , and . GLOBECOM, IEEE, (2006)Image Processing Approach to Automatic Scoring System for Archery Targets., , , , , and . IIH-MSP, page 259-262. IEEE, (2013)An Automatic Error Identification Method in Call Control Protocol Using Levenshtein Distance., , , , and . ICIN, page 266-273. IEEE, (2020)Real-Time Identification of Different TCP Versions., , and . APNOMS, volume 4773 of Lecture Notes in Computer Science, page 215-224. Springer, (2007)Towards real-time processing for application identification of encrypted traffic., , , , and . ICNC, page 136-140. IEEE, (2014)Effective bit selection methods for improving performance of packet classifications on IP routers., , , and . GLOBECOM, page 2350-2354. IEEE, (2002)Identification of Attack Nodes from Traffic Matrix Estimation., , and . IEICE Trans. Commun., 90-B (10): 2854-2864 (2007)SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet., , , , , , , , and . Comput. Networks, (2014)A New TCAM Architecture for Managing ACL in Routers., , , , and . IEICE Trans. Commun., 93-B (11): 3004-3012 (2010)