Author of the publication

A scalable, efficient and informative approach for anomaly-based intrusion detection systems: theory and practice.

, , and . Int. J. Netw. Manag., 20 (5): 271-293 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance modelling of GSM/GPRS cells with different radio resource allocation strategies., , and . WCNC, page 1317-1322. IEEE, (2005)A new test of stationarity and its application to teletraffic data.. ICASSP, page 3449-3452. IEEE, (1998)A 6-month analysis of factors impacting web browsing quality for QoE prediction., , and . Comput. Networks, (2019)Découvrir de nouvelles classes dans des données tabulaires., , , , , and . CoRR, (2022)Volume Anomaly Detection in Data Networks: An Optimal Detection Algorithm vs. the PCA Approach., , , and . FITraMEn, volume 5464 of Lecture Notes in Computer Science, page 96-113. Springer, (2008)An Interactive Interface for Novel Class Discovery in Tabular Data., , , , , and . ECML/PKDD (7), volume 14175 of Lecture Notes in Computer Science, page 295-299. Springer, (2023)Poster Abstract: A flexible infinite HMM model for accurate characterization and segmentation of RTT timeseries., , and . INFOCOM Workshops, page 1055-1056. IEEE, (2019)Statistical Characterization of Round-Trip Times with Nonparametric Hidden Markov Models., , and . IM, page 43-48. IFIP, (2019)Which secure transport protocol for a reliable HTTP/2-based web service: TLS or QUIC?, , and . ISCC, page 879-884. IEEE Computer Society, (2017)Explainability-based Metrics to Help Cyber Operators Find and Correct Misclassified Cyberattacks., , , and . SAFE@CoNEXT, page 9-15. (2023)