Author of the publication

Network Anomaly Detection by IP Flow Graph Analysis: A DDoS Attack Case Study.

, , , , and . SCCC, page 90-94. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time Series Segmentation Based on Stationarity Analysis to Improve New Samples Prediction., , , and . Sensors, 21 (21): 7333 (2021)A New Approach for Fuzzy Classification in Relational Databases., , , and . DEXA (2), volume 6861 of Lecture Notes in Computer Science, page 511-518. Springer, (2011)New Approaches for XML Data Compression., , , , and . WEBIST, page 233-237. SciTePress, (2012)Metrics Application in Metropolitan Broadband Access Network Security Analysis., , , and . SECRYPT, page 473-476. INSTICC Press, (2008)Evaluation of quality in encrypted VoIP calls., , , , and . CASoN, page 175-180. IEEE, (2012)Networking Anomaly Detection Using DSNs and Particle Swarm Optimization with Re-Clustering., , , , , and . GLOBECOM, page 1-6. IEEE, (2010)Anomaly Detection Aiming Pro-Active Management of Computer Network Based on Digital Signature of Network Segment., , and . LANOMS, page 53-64. UFRGS, (2005)Supervised Machine Learning and Detection of Unknown Attacks: An Empirical Evaluation., , , , and . AINA (2), volume 654 of Lecture Notes in Networks and Systems, page 379-391. Springer, (2023)Online detection of Botnets on Network Flows using Stream Mining., , , and . SBRC, page 225-238. (2018)An Empirical Study of Factors Affecting the Rate of Spam., , , and . SBRC, page 239-252. (2018)