Author of the publication

An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling.

, and . IEEE Trans. Inf. Forensics Secur., 13 (4): 850-860 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling., and . IEEE Trans. Inf. Forensics Secur., 13 (4): 850-860 (2018)An adaptable deep learning-based intrusion detection system to zero-day attacks., , , and . J. Inf. Secur. Appl., (August 2023)A Lightweight Key Establishment Scheme for Wireless Sensor Networks., , and . NTMS, page 1-5. IEEE, (2009)Voice quality measurement in a typical router-based network., and . LCN, page 274-275. IEEE Computer Society, (2007)RACE: A Real-Time Scheduling Policy and Communication Architecture for Large-Scale Wireless Sensor Networks., , , and . CNSR, page 458-460. IEEE Computer Society, (2009)Network survivability performance evaluation using fault trees., , and . Communications and Computer Networks, page 158-163. IASTED/ACTA Press, (2005)Time and energy cost analysis of Kerberos security protocol in Wireless Sensor Networks., and . IAS, page 308-313. IEEE, (2011)Session-persistent Load Balancing for Clustered Web Servers without Acting as a Reverse-proxy., , and . CNSM, page 360-364. IEEE, (2021)Survivability Analysis of Wireless Sensor Network with Transient Faults., , and . CIMCA/IAWTIC/ISE, page 975-980. IEEE Computer Society, (2008)Survivability modeling of wireless sensor networks., , , and . ISWCS, page 593-597. IEEE, (2008)