Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks., , , and . ISCC, page 761-767. IEEE Computer Society, (2006)A network fault diagnostic approach based on a statistical traffic normality prediction algorithm., and . GLOBECOM, page 2918-2922. IEEE, (2003)Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies., and . Comput. Commun., 29 (10): 1627-1638 (2006)Game theoretic distributed uplink power control for CDMA networks with real-time services., and . Comput. Commun., 32 (2): 376-385 (2009)Strategy evolution of information diffusion under time-varying user behavior in generalized networks., , , and . Comput. Commun., (2017)A continuum theory-based approach to the modeling of dynamic wireless sensor networks., and . IEEE Communications Letters, 9 (4): 337-339 (2005)An entropy-based model for supporting and evaluating route stability in mobile ad hoc wireless networks., and . IEEE Communications Letters, 6 (8): 328-330 (2002)Design and Assessment of a Reputation-Based Trust Framework in Wireless Testbeds Utilizing User Experience., , , and . ADHOC-NOW, volume 7960 of Lecture Notes in Computer Science, page 1-12. Springer, (2013)Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis., , and . J. Comput. Sci. Technol., 23 (3): 389-399 (2008)Intelligent Flow-Based Sampling for Effective Network Anomaly Detection., and . GLOBECOM, page 1948-1953. IEEE, (2007)