Author of the publication

DDoS flooding attack detection through a step-by-step investigation.

, , and . NESEA, page 1-5. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Neural Inverse Modeling Scheme to Optimal Parameter Tuning of Filter Test Equipment., , and . Int. J. Fuzzy Log. Intell. Syst., 4 (2): 172-175 (2004)DDoS attack detection by using packet sampling and flow features., , and . SAC, page 711-712. ACM, (2014)Performance Analysis of MAC Protocol for EPON Using OPNET., , , and . Human.Society@Internet 2003, volume 2713 of Lecture Notes in Computer Science, page 656-661. Springer, (2003)Real-Time Forensic Marking Method based on Tiles Parallel Processing., , , and . ICTC, page 1475-1477. IEEE, (2020)Conditional Log-linear Structures for Log-linear Modelling.. Modelling, Identification and Control, page 477-482. IASTED/ACTA Press, (2003)Analysis on time-delay of commercial off-the-shelf vision system considering motion-blur., and . IROS, page 2080-2085. IEEE, (2001)High-voltage input power supply for modular multi-level converter., , and . AIM, page 1690-1693. IEEE, (2015)Development of heat generating system based on small wind turbine system., , and . SCIS&ISIS, page 1209-1212. IEEE, (2014)A Method of Object Recognition which Applicable to the Real-Time Processing Using Adaptive Factors., , , , and . MUE, page 686-691. IEEE Computer Society, (2007)DDoS flooding attack detection through a step-by-step investigation., , and . NESEA, page 1-5. IEEE Computer Society, (2011)