Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Safeguarding Building Automation Networks: THE-Driven Anomaly Detector Based on Traffic Analysis., and . ICCCN, page 1-11. IEEE, (2017)Detecting algorithmically generated malicious domain names., , , and . Internet Measurement Conference, page 48-61. ACM, (2010)TCP-DCR: Making TCP Robust to Non-congestion Events., and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 712-724. Springer, (2004)Gracefully Degradable Disk Arrays., and . FTCS, page 401-409. IEEE Computer Society, (1991)Modeling network traffic as images., and . ICC, page 168-172. IEEE, (2005)A Service Providers Approach for Improving Performance of Aggregate Voice-over-IP Traffic., and . IWQoS, page 169-177. IEEE, (2006)Disk scheduling in a multimedia I/O system., , and . ACM Trans. Multim. Comput. Commun. Appl., 1 (1): 37-59 (2005)Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness., and . IEEE J. Sel. Areas Commun., 24 (10): 1942-1954 (2006)Providing QOS Guarantees for Disk I/O., and . Multim. Syst., 8 (1): 57-68 (2000)Parallel input/output architectures for multiprocessors. University of Illinois Urbana-Champaign, USA, (1990)