Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure and privacy-preserving approach to communications in smart grids., , , and . Int. J. Trust. Manag. Comput. Commun., 3 (3): 269-290 (2016)Improving PCA-based anomaly detection by using multiple time scale analysis and Kullback-Leibler divergence., , , , and . Int. J. Commun. Syst., 27 (10): 1731-1751 (2014)Security and delay issues in SIP systems., , , and . Int. J. Commun. Syst., 22 (8): 1023-1044 (2009)Design and Performance Evaluation of Service Overlay Networks Topologies., , , , and . J. Networks, 6 (4): 556-566 (2011)A Behavioral Study of TCP Linux Variants over Satellite Networks., , , , and . SAINT, page 474-479. IEEE Computer Society, (2011)Statistical Network Anomaly Detection: An Experimental Study., , and . FNSS, volume 670 of Communications in Computer and Information Science, page 12-25. (2016)Combining wavelet analysis and CUSUM algorithm for network anomaly detection., , , and . ICC, page 1091-1095. IEEE, (2012)Distributed and Centralized Path Computation Algorithms: Implementation in NS2 and Performance Comparison., , , and . ICC, page 17-21. IEEE, (2008)Application of Wavelet Packet Transform to Network Anomaly Detection., , and . NEW2AN, volume 5174 of Lecture Notes in Computer Science, page 246-257. Springer, (2008)An open hardware implementation of CUSUM based network anomaly detection., , and . GLOBECOM, page 2760-2765. IEEE, (2012)