Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NS2 Extensions for the Simulation of RDM and G-RDM in DS-TE Networks., , , and . ICC, page 1-5. IEEE, (2010)A Novel PCA-Based Network Anomaly Detection., , , , and . ICC, page 1-5. IEEE, (2011)Class-based traffic recovery with load balancing in software-defined networks., , , and . GLOBECOM Workshops, page 161-165. IEEE, (2014)Rare Events of Gaussian Processes: A Performance Comparison Between Bridge Monte-Carlo and Importance Sampling., , and . NEW2AN, volume 4712 of Lecture Notes in Computer Science, page 269-280. Springer, (2007)Impact of Histogram Construction Techniques on Information - Theoretic Anomaly Detection., , and . CN, volume 718 of Communications in Computer and Information Science, page 154-165. Springer, (2017)Analysis of CMPP Approach in Modeling Broadband Traffic., , , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 340-352. Springer, (2002)Topology Design for Service Overlay Networks with Economic and QoS Constraints., , , , and . Networking, volume 5550 of Lecture Notes in Computer Science, page 847-858. Springer, (2009)Forecasting the Distribution of Network Traffic for Anomaly Detection., , , and . TrustCom, page 173-180. IEEE Computer Society, (2011)Entropy-based network anomaly Detection., , and . ICNC, page 334-340. IEEE Computer Society, (2017)Signalling protocols in diffserv-aware MPLS networks: design and implementation of RSVP-TE network simulator., , , , , and . GLOBECOM, page 792-796. IEEE, (2005)