From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Artificial Immune Systems and Fuzzy Logic to Detect Flooding Attacks in Software-Defined Networks., , , и . IEEE Access, (2020)Fast Defense System Against Attacks in Software Defined Networks., , , , , и . IEEE Access, (2018)Improved MB Cognitive Radio Spectrum Sensing Using Wavelet Spectrum Filtering., , , и . Journal of Circuits, Systems, and Computers, 28 (8): 1950136:1-1950136:22 (2019)Dependency graph to improve notifications' semantic on anomaly detection., , и . NOMS, стр. 726-729. IEEE, (2008)Anomaly detection using DSNS and Firefly Harmonic Clustering Algorithm., , , , и . ICC, стр. 1183-1187. IEEE, (2012)Digital Signature of Network Segment using PCA, ACO and Holt-Winters for network management., , , , и . Healthcom, стр. 564-568. IEEE, (2013)Network Anomaly Detection by IP Flow Graph Analysis: A DDoS Attack Case Study., , , , и . SCCC, стр. 90-94. IEEE Computer Society, (2013)The Hurst Parameter for Digital Signature of Network Segment., , , , и . ICT, том 3124 из Lecture Notes in Computer Science, стр. 772-781. Springer, (2004)A mobile health monitoring solution for weight control., , , , и . WCSP, стр. 1-5. IEEE, (2011)Using Ant Colony Optimization metaheuristic and Dynamic Time Warping for anomaly detection., , , и . SoftCOM, стр. 1-5. IEEE, (2013)