Author of the publication

Network Anomaly Detection by IP Flow Graph Analysis: A DDoS Attack Case Study.

, , , , and . SCCC, page 90-94. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Approaches for XML Data Compression., , , , and . WEBIST, page 233-237. SciTePress, (2012)Metrics Application in Metropolitan Broadband Access Network Security Analysis., , , and . SECRYPT, page 473-476. INSTICC Press, (2008)A New Approach for Fuzzy Classification in Relational Databases., , , and . DEXA (2), volume 6861 of Lecture Notes in Computer Science, page 511-518. Springer, (2011)Time Series Segmentation Based on Stationarity Analysis to Improve New Samples Prediction., , , and . Sensors, 21 (21): 7333 (2021)Photovoltaic Generation Forecast: Model Training and Adversarial Attack Aspects., , , and . BRACIS (2), volume 12320 of Lecture Notes in Computer Science, page 634-649. Springer, (2020)Power Allocation in Multirate DS/CDMA Systems Based on Verhulst Equilibrium., , , , and . ICC, page 1-6. IEEE, (2010)Attack Detection in Smart Home IoT Networks using CluStream and Page-Hinkley Test., , and . LATINCOM, page 1-6. IEEE, (2021)Um estudo empírico sobre o uso de métricas de segurança em ambientes reais., , and . SBSI, page 699-710. (2014)Anomaly Detection Using DSNS and a Dependency Graph for SNMP Objects., , and . AICT, page 56-63. IEEE Computer Society, (2008)Investigando o Impacto de Amostras Adversárias na Detecção de Intrusões em um Sistema Ciberfísico., , and . SBRC, page 281-294. (2023)