From post

Classification of Hidden Users' Profiles in Wireless Communications.

, , и . MONAMI, том 97 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 3-16. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IPTV service based on a content-zapping paradigm., , , и . Multim. Syst., 17 (4): 351-364 (2011)Supporting Unified Distributed Management and Autonomic Decisions: Design, Implementation and Deployment., , , , , , и . J. Netw. Syst. Manag., 25 (2): 416-456 (2017)Towards the On-line Identification of Peer-to-peer Flow Patterns., , , и . J. Networks, 4 (2): 108-118 (2009)Detection of Internet-wide traffic redirection attacks using machine learning techniques., , , , и . IET Networks, 12 (4): 179-195 (июля 2023)Can multiscale traffic analysis be used to differentiate Internet applications?, , и . Telecommun. Syst., 48 (1-2): 19-30 (2011)Markov Modulated Bi-variate Gaussian Processes for Mobility Modeling and Location Prediction., и . Networking (1), том 6640 из Lecture Notes in Computer Science, стр. 227-240. Springer, (2011)Prediction of low accessibility in 4G networks., , , , , , и . Ann. des Télécommunications, 77 (5-6): 421-435 (2022)Identification of anomalies on encrypted communications based on multi-scale behavior modeling., , , и . ICUMT, стр. 1-7. IEEE, (2011)Robust feature selection and robust PCA for internet traffic anomaly detection., , , , , и . INFOCOM, стр. 1755-1763. IEEE, (2012)On the analysis of dissemination management information through an Eyesight perspective., , , , и . GLOBECOM Workshops, стр. 1001-1006. IEEE, (2013)