Author of the publication

Investigating the utility of S-transform for detecting Denial-of-Service and probe attacks.

, , , and . ICOIN, page 282-287. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks., , and . AINTEC, volume 3837 of Lecture Notes in Computer Science, page 195-209. Springer, (2005)How much can we survive on an IPv6 network?: experience on the IPv6 only connectivity with NAT64/DNS64 at WIDE camp 2011 Autumn., , , , , and . AINTEC, page 144-151. ACM, (2011)Detecting anomalies in massive traffic with sketches., , , and . CFI, page 14:1-14:2. ACM, (2014)The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies., , , , and . ICISSP, page 243-254. SciTePress, (2016)Distributed Scalable Multi-player Online Game Servers on Peer-to-Peer Networks., , and . Inf. Media Technol., 1 (1): 545-560 (2006)Adaptive Bloom Filter: A Space-Efficient Counting Algorithm for Unpredictable Network Traffic, , and . IEICE - Trans. Inf. Syst., E91-D (5): 1292--1299 (2008)Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly., , and . ICONIP (1), volume 5506 of Lecture Notes in Computer Science, page 547-554. Springer, (2008)Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies., , , and . IEICE Trans. Inf. Syst., 98-D (3): 588-595 (2015)Experiences in emulating 10K AS topology with massive VM multiplexing., , , , , , and . VISA, page 97-104. ACM, (2009)EtherPIPE: an ethernet character device for network scripting., , , , and . HotSDN, page 61-66. ACM, (2013)