Author of the publication

An aggregated statistical approach for network flood detection using Gamma-Normal mixture modeling.

, , and . Comput. Commun., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AMVPayword: Secure and Efficient Anonymous Payword-Based Micropayment Scheme., , and . CIS, page 551-555. IEEE Computer Society, (2010)Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model., and . FGIT, volume 6485 of Lecture Notes in Computer Science, page 439-449. Springer, (2010)Cost-sensitive payment card fraud detection based on dynamic random forest and k-nearest neighbors., and . Expert Syst. Appl., (2018)Agent-oriented Design for Network Survivability., and . ISDA, page 166-171. IEEE Computer Society, (2005)An Enhanced Infrastructure for Peer-to-Peer Intrusion Detection Systems., and . ICECS, page 364-368. IEEE Computer Society, (2009)Flash payment: payment using flash disks., and . ICEC, page 346-351. ACM, (2009)Path reduction in complex grid service provision., and . ICEC, page 88-93. ACM, (2010)Analysis of incentive mechanism in Repchain., and . CSICC, page 1-5. IEEE, (2021)Intelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment., , , and . IEEE Conf. on Intelligent Systems, page 709-714. IEEE, (2016)Using Genre Interest of Users to Detect Profile Injection Attacks in Movie Recommender Systems., , , and . ICMLA (1), page 49-52. IEEE Computer Society, (2011)