From post

Using the Cumulative Sum Algorithm Against Distributed Denial of Service Attacks in Internet of Things.

, , , и . ICCASA, том 165 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 62-72. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Machaka, Pheeha
add a person with the name Machaka, Pheeha
 

Другие публикации лиц с тем же именем

A Reference Point for Designing a Cybersecurity Curriculum for Universities., , , , , , , и . HAISA, том 613 из IFIP Advances in Information and Communication Technology, стр. 46-62. Springer, (2021)A highly scalable monitoring tool for Wi-Fi networks., , и . IDAACS-SWS, стр. 102-107. IEEE, (2012)Modelling DDoS Attacks in IoT Networks Using Machine Learning., , , , и . AFRICATEK, том 503 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 161-175. Springer, (2022)Statistical Properties and Modelling of DDoS Attacks., и . ICCASA/ICTCC, том 343 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 44-54. Springer, (2020)Monitoring of a Large Wi-Fi Hotspots Network: Performance Investigation of Soft Computing Techniques., , и . BIONETICS, том 103 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 155-162. Springer, (2011)Preemptive Performance Monitoring of a Large Network of Wi-Fi Hotspots: An Artificial Immune System., и . WWIC, том 6649 из Lecture Notes in Computer Science, стр. 494-504. Springer, (2011)A Comparative Evaluation of Business Intelligence Technologies with Application to Product Profiling., , , и . BIONETICS, том 103 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 133-140. Springer, (2011)Drought Monitoring: A Performance Investigation of Three Machine Learning Techniques.. ICCASA, том 128 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 47-56. Springer, (2013)An Investigation of Scalable Anomaly Detection Techniques for a Large Network of Wi-Fi Hotspots., и . Infoscale, том 139 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 71-79. Springer, (2014)Using the Cumulative Sum Algorithm Against Distributed Denial of Service Attacks in Internet of Things., , , и . ICCASA, том 165 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 62-72. Springer, (2015)