Author of the publication

An Anomaly Detection System Based on Chi-Square Method with Dynamic BIN Algorithm.

, , , and . BWCCA, page 549-554. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Nakashima, Takuo
add a person with the name Nakashima, Takuo
 

Other publications of authors with the same name

Flooding Features for the AODV Protocol., and . ICWN, page 468-473. CSREA Press, (2009)Statistical Analysis of Propagation Properties with Heavy-Tailedness.. International Conference on Internet Computing, page 328-334. CSREA Press, (2004)Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method., , and . NBiS, page 221-228. IEEE Computer Society, (2011)Queue Length Behavior on Restricted Link Under Bursty Self-similar TCP Traffic.. AINA Workshops, page 452-457. IEEE Computer Society, (2009)DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number., , , and . IIH-MSP, page 206-209. IEEE Computer Society, (2009)An Anomaly Detection System Based on Chi-Square Method with Dynamic BIN Algorithm., , , and . BWCCA, page 549-554. IEEE Computer Society, (2011)Performance Estimation of TCP under SYN Flood Attacks., and . CISIS, page 92-99. IEEE Computer Society, (2007)Computational Complexity of Anomaly Detection Methods., and . BWCCA, page 644-649. IEEE, (2012)Performance of the MPI Based File Share System., and . BWCCA, page 561-566. IEEE Computer Society, (2011)Extraction of Characteristics of Anomaly Accessed IP Packets Using Chi-square Method., , and . CISIS, page 287-292. IEEE Computer Society, (2009)