Author of the publication

Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions.

, , , and . NBiS, page 766-770. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ATMSim: An anomaly teletraffic detection measurement analysis simulator., , and . Simul. Model. Pract. Theory, (2014)A computer remote control system based on speech recognition technologies of mobile devices and wireless communication technologies., , , , and . Comput. Sci. Inf. Syst., 11 (3): 1001-1016 (2014)Performance Modeling and Simulation for Future Mobile Networks., , , and . Math. Comput. Model., 57 (11-12): 2718-2719 (2013)Fast self-similar teletraffic generation based on FGN and wavelets., , and . ICON, page 75-82. IEEE, (1999)A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices., , , , , and . IMIS, page 595-600. IEEE Computer Society, (2013)Self-Similar Properties of Spam., , , and . IMIS, page 347-352. IEEE Computer Society, (2011)Heuristic Rules for Improving the Quality of Simulation Based on the Sequential Non-overlapping Batch Mean., and . IPC, page 105-110. IEEE Computer Society, (2007)A real-time location-based SNS smartphone application for the disabled population., , , and . Comput. Sci. Inf. Syst., 10 (2): 747-765 (2013)Distributed steady-state simulation of telecommunication networks with self-similar teletraffic., , , and . Simul. Model. Pract. Theory, 13 (3): 233-256 (2005)Welcome message from FINGNet-2013 international workshop organizers, , , , and . Proceedings-7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013, page 51. (2013)