Author of the publication

Intelligent Flow-Based Sampling for Effective Network Anomaly Detection.

, and . GLOBECOM, page 1948-1953. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network anomaly detection and classification via opportunistic sampling., , and . IEEE Netw., 23 (1): 6-12 (2009)Network virtualization over heterogeneous federated infrastructures: Data plane connectivity., , , , , , and . IM, page 26-33. IEEE, (2013)Architecture for the heterogeneous federation of Future Internet experimentation facilities., , , , , , , , , and 7 other author(s). Future Network & Mobile Summit, page 1-11. IEEE, (2013)Virtual Topology Mapping in SDN-Enabled Clouds., , and . NCCA, page 62-67. IEEE Computer Society, (2014)Reputation-Based Trust in federated testbeds utilizing user experience., , , , and . CAMAD, page 56-60. IEEE, (2014)Intelligent Flow-Based Sampling for Effective Network Anomaly Detection., and . GLOBECOM, page 1948-1953. IEEE, (2007)A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox., , and . Secur. Commun. Networks, 9 (13): 1958-1970 (2016)Design and Assessment of a Reputation-Based Trust Framework in Wireless Testbeds Utilizing User Experience., , , and . ADHOC-NOW, volume 7960 of Lecture Notes in Computer Science, page 1-12. Springer, (2013)Control-plane slicing methods in multi-tenant software defined networks., , , , , and . IM, page 612-618. IEEE, (2015)Two-stage selective sampling for anomaly detection: analysis and evaluation., and . Secur. Commun. Networks, 4 (6): 608-621 (2011)