Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Approaches for XML Data Compression., , , , and . WEBIST, page 233-237. SciTePress, (2012)Time Series Segmentation Based on Stationarity Analysis to Improve New Samples Prediction., , , and . Sensors, 21 (21): 7333 (2021)Evaluating the Four-Way Performance Trade-Off for Data Stream Classification in Edge Computing., , , , and . IEEE Trans. Netw. Serv. Manag., 17 (2): 1013-1025 (2020)Metrics Application in Metropolitan Broadband Access Network Security Analysis., , , and . SECRYPT, page 473-476. INSTICC Press, (2008)Construction of baselines for VoIP traffic management on open MANs., , , , and . Int. J. Netw. Manag., 23 (2): 137-153 (2013)A New Approach for Fuzzy Classification in Relational Databases., , , and . DEXA (2), volume 6861 of Lecture Notes in Computer Science, page 511-518. Springer, (2011)Deep IP flow inspection to detect beyond network anomalies., , , and . Comput. Commun., (2017)Mobile botnets detection based on machine learning over system calls., , , , and . Int. J. Secur. Networks, 14 (2): 103-118 (2019)Photovoltaic Generation Forecast: Model Training and Adversarial Attack Aspects., , , and . BRACIS (2), volume 12320 of Lecture Notes in Computer Science, page 634-649. Springer, (2020)Recognition on Online Social Network by user's writing style., , , and . Braz. J. Inf. Syst., 8 (3): 64-85 (2015)