Author of the publication

Detecting Denial-of-Service attacks using the wavelet transform.

, and . Comput. Commun., 30 (16): 3203-3213 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Validation of Security Solutions for Communication Networks: A Policy-Based Approach., , and . NCA, page 115-122. IEEE Computer Society, (2011)Optical Label Switching: Design issues, modeling and performance analysis., , and . ICECS, page 1-5. IEEE, (2005)Border surveillance using sensor based thick-lines., , and . ICOIN, page 221-226. IEEE Computer Society, (2013)Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach., , and . AICCSA, page 233-240. IEEE Computer Society, (2007)Doppler Effect on Location-Based Tracking in Mobile Sensor Networks., , and . AICCSA, page 252-257. IEEE Computer Society, (2007)A QoS-Oriented Protocol for Burst Admission Control in OBS Networks., , , and . AICCSA, page 172-179. IEEE Computer Society, (2007)A new genetic algorithm approach for intrusion response system in computer networks., , , and . ISCC, page 342-347. IEEE Computer Society, (2009)A public key algorithm for optical communication based on lattice cryptography., , and . ISCC, page 200-205. IEEE Computer Society, (2009)An all-optical synchronizer for switching node using single-sideband modulator and fiber Bragg gratings., , , and . ISCC, page 736-741. IEEE Computer Society, (2009)The design of an optical wireless sensor network based train vibration monitoring system., and . ICTON, page 1-5. IEEE, (2017)