Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments., , , , , , and . Int. J. Inf. Secur. Priv., 16 (1): 1-16 (2022)IFS - Intrusion forecasting system based on collaborative architecture., and . ICDIM, page 217-222. IEEE, (2009)IDS 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted traffic., and . ICITST, page 1-6. IEEE, (2009)Communication Middleware to Distributed Multimedia Application on High Speed Multi-service Networks: Design and experiences., , and . IMSA, page 294-299. IASTED/ACTA Press, (2002)Predicting model for identifying the malicious activity of nodes in MANETs., , , , , , and . ISCC, page 700-707. IEEE Computer Society, (2015)Analysis and Implementation of a Pre-defined QoS Specification Methodology for VoD Systems., , , and . IMSA, page 406-411. IASTED/ACTA Press, (2001)Evaluation of theora and speex performance in IP videoconferencing., , , and . WebMedia, page 135-138. ACM, (2012)Analysis and handling of biased data provided by wireless sensor networks with lack of energy., , , , , , and . Int. J. Sens. Networks, 41 (3): 137-151 (2023)IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis., , , and . Wirel. Networks, 25 (4): 1533-1556 (2019)Privacy-preserving cloud-connected IoT data using context-aware and end-to-end secure messages., , , and . FNC/MobiSPC, volume 191 of Procedia Computer Science, page 25-32. Elsevier, (2021)