Author of the publication

A threat monitoring system for intelligent data analytics of network traffic.

, , , , and . Ann. des Télécommunications, 77 (7-8): 539-554 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A threat monitoring system for intelligent data analytics of network traffic., , , , and . Ann. des Télécommunications, 77 (7-8): 539-554 (2022)Enhancing Automatic Attack Detection through Spectral Decomposition of Network Flows., , , , and . GLOBECOM, page 2074-2079. IEEE, (2022)A Blockchain-based System for Secure and Distributed Virtual Network Functions Orchestration., , , , and . ICC, page 347-352. IEEE, (2022)Topological Evolution Analysis of Payment Channels in the Lightning Network., , , , , , and . LATINCOM, page 1-6. IEEE, (2022)A Secure Personal-Data Trading System Based on Blockchain, Trust, and Reputation., , , and . Blockchain, page 379-384. IEEE, (2020)Security and Performance Analysis of Quorum-based Blockchain Consensus Protocols., , , , and . CSNet, page 1-7. IEEE, (2022)TeMIA-NT: ThrEat Monitoring and Intelligent data Analytics of Network Traffic., , , , , , , and . CIoT, page 9-16. IEEE, (2020)A security and performance analysis of proof-based consensus protocols., , , , , and . Ann. des Télécommunications, 77 (7-8): 517-537 (2022)AutAvailChain: Automatic and Secure Data Availability through Blockchain., , , and . GLOBECOM, page 1-6. IEEE, (2020)On the Security and Performance of Proof-based Consensus Protocols., , , , and . CIoT, page 67-74. IEEE, (2020)