Author of the publication

Detecting Clusters of Anomalies on Low-Dimensional Feature Subsets with Application to Network Traffic Flow Data.

, , and . CoRR, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polymorphic worm detection and defense: system design, experimental methodology, and data resources., , , and . LSAD@SIGCOMM, page 169-176. ACM, (2006)Roaming charges for customers of cellular-wireless entrant providers., , , and . INFOCOM Workshops, page 1-5. IEEE, (2015)Robust Sybil Detection for MANETs., , , and . ICCCN, page 1-6. IEEE Computer Society, (2009)Behavior in a shared resource game with cooperative, greedy, and vigilante players., and . CISS, page 1-6. IEEE, (2014)Multiperiod subscription pricing for cellular wireless entrants., , , , , and . CISS, page 326-330. IEEE, (2016)Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks., , , and . ICC, page 3807-3811. IEEE, (2004)On Fair Attribution of Costs under Peak-Based Pricing to Cloud Tenants., , , , , and . MASCOTS, page 51-60. IEEE Computer Society, (2015)Competition and Peak-Demand Pricing in Clouds Under Tenants' Demand Response., , , and . MASCOTS, page 244-254. IEEE Computer Society, (2017)A caching system with object sharing., , , and . CoRR, (2019)A Stochastic Epidemiological Model and a Deterministic Limit for BitTorrent-Like Peer-to-Peer File-Sharing Networks., , and . NET-COOP, volume 5425 of Lecture Notes in Computer Science, page 26-36. Springer, (2008)