From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dependency graph to improve notifications' semantic on anomaly detection., , и . NOMS, стр. 726-729. IEEE, (2008)Fast Defense System Against Attacks in Software Defined Networks., , , , , и . IEEE Access, (2018)Artificial Immune Systems and Fuzzy Logic to Detect Flooding Attacks in Software-Defined Networks., , , и . IEEE Access, (2020)Improved MB Cognitive Radio Spectrum Sensing Using Wavelet Spectrum Filtering., , , и . Journal of Circuits, Systems, and Computers, 28 (8): 1950136:1-1950136:22 (2019)Anomaly detection using DSNS and Firefly Harmonic Clustering Algorithm., , , , и . ICC, стр. 1183-1187. IEEE, (2012)Digital Signature of Network Segment using PCA, ACO and Holt-Winters for network management., , , , и . Healthcom, стр. 564-568. IEEE, (2013)The Hurst Parameter for Digital Signature of Network Segment., , , , и . ICT, том 3124 из Lecture Notes in Computer Science, стр. 772-781. Springer, (2004)Network Anomaly Detection by IP Flow Graph Analysis: A DDoS Attack Case Study., , , , и . SCCC, стр. 90-94. IEEE Computer Society, (2013)ACO and GA metaheuristics for anomaly detection., , и . SCCC, стр. 1-6. IEEE, (2015)Anomaly Detection using Firefly Harmonic Clustering Algorithm., , , , и . DCNET/OPTICS, стр. 63-68. SciTePress, (2011)