Author of the publication

PRBS/EWMA based model for predicting burst attacks (Brute Froce, DoS) in computer networks.

, , , , and . ICDIM, page 194-200. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments., , , , , , and . Int. J. Inf. Secur. Priv., 16 (1): 1-16 (2022)IFS - Intrusion forecasting system based on collaborative architecture., and . ICDIM, page 217-222. IEEE, (2009)IDS 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted traffic., and . ICITST, page 1-6. IEEE, (2009)Communication Middleware to Distributed Multimedia Application on High Speed Multi-service Networks: Design and experiences., , and . IMSA, page 294-299. IASTED/ACTA Press, (2002)Predicting model for identifying the malicious activity of nodes in MANETs., , , , , , and . ISCC, page 700-707. IEEE Computer Society, (2015)Applying multi-correlation for improving forecasting in cyber security., , , and . ICDIM, page 179-186. IEEE, (2011)IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis., , , and . Wirel. Networks, 25 (4): 1533-1556 (2019)Analysis and Implementation of a Pre-defined QoS Specification Methodology for VoD Systems., , , and . IMSA, page 406-411. IASTED/ACTA Press, (2001)Evaluation of theora and speex performance in IP videoconferencing., , , and . WebMedia, page 135-138. ACM, (2012)Analysis and handling of biased data provided by wireless sensor networks with lack of energy., , , , , , and . Int. J. Sens. Networks, 41 (3): 137-151 (2023)