Author of the publication

A Consensus Based Network Intrusion Detection System.

, , and . ICITCS, page 1-6. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A three-phase matheuristic for capacitated multi-commodity fixed-cost network design with design-balance constraints., , and . J. Heuristics, 19 (5): 757-795 (2013)Lower-Bound Study for Function Computation in Distributed Networks via Vertex-Eccentricity., and . SN Comput. Sci., 1 (1): 10:1-10:14 (2020)Message from the Program Chairs and Industry Panel Chairs., , , , and . ACOMP, page ix. IEEE, (2020)Parallel Strategies for Meta-Heuristics., and . Handbook of Metaheuristics, volume 57 of International Series in Operations Research & Management Science, Kluwer / Springer, (2003)Supporting Co-Allocation in an Auctioning-Based Resource Allocator for Grid Systems., , and . IPDPS, IEEE Computer Society, (2002)A Consensus Based Network Intrusion Detection System., , and . ICITCS, page 1-6. IEEE Computer Society, (2015)Protecting Consensus Seeking NIDS Modules against Multiple Attackers., and . SoICT, page 226-233. ACM, (2017)Relating Network-Diameter and Network-Minimum-Degree for Distributed Function Computation., and . FDSE, volume 12466 of Lecture Notes in Computer Science, page 134-150. Springer, (2020)Applicability and Resilience of a Linear Encoding Scheme for Computing Consensus., and . IoTBDS, page 173-184. SciTePress, (2018)A distributed p-cycle protection scheme in multi-domain optical networks., , and . GLOBECOM, page 3019-3025. IEEE, (2012)