Author of the publication

A Friendliness Study of TCP Linux Variants.

, , , and . CN, volume 291 of Communications in Computer and Information Science, page 14-23. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure and privacy-preserving approach to communications in smart grids., , , and . Int. J. Trust. Manag. Comput. Commun., 3 (3): 269-290 (2016)Improving PCA-based anomaly detection by using multiple time scale analysis and Kullback-Leibler divergence., , , , and . Int. J. Commun. Syst., 27 (10): 1731-1751 (2014)Security and delay issues in SIP systems., , , and . Int. J. Commun. Syst., 22 (8): 1023-1044 (2009)Design and Performance Evaluation of Service Overlay Networks Topologies., , , , and . J. Networks, 6 (4): 556-566 (2011)Distributed and Centralized Path Computation Algorithms: Implementation in NS2 and Performance Comparison., , , and . ICC, page 17-21. IEEE, (2008)Combining wavelet analysis and CUSUM algorithm for network anomaly detection., , , and . ICC, page 1091-1095. IEEE, (2012)Application of Wavelet Packet Transform to Network Anomaly Detection., , and . NEW2AN, volume 5174 of Lecture Notes in Computer Science, page 246-257. Springer, (2008)Statistical Network Anomaly Detection: An Experimental Study., , and . FNSS, volume 670 of Communications in Computer and Information Science, page 12-25. (2016)A Behavioral Study of TCP Linux Variants over Satellite Networks., , , , and . SAINT, page 474-479. IEEE Computer Society, (2011)Path computation algorithms in NS2., , , and . SimuTools, page 54. ICST/ACM, (2008)