Author of the publication

Bridging the Gap between Low-Level Network Traffic Data Acquisition and Higher-Level Frameworks.

, , and . COMPSAC Workshops, page 67-72. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multijob: a framework for efficient distribution of evolutionary algorithms for parameter tuning., , , and . GECCO (Companion), page 1231-1238. ACM, (2017)Can I add a VoIP call?, and . ICC, page 779-783. IEEE, (2003)Tackling security vulnerabilities in VPN-based wireless deployments., , , , and . ICC, page 100-104. IEEE, (2004)Maintaining Genetic Diversity in Multimodal Evolutionary Algorithms using Population Injection., , , and . GECCO (Companion), page 95-96. ACM, (2016)Improving network traffic acquisition and processing with the Java Virtual Machine., , and . ISCC, page 347-352. IEEE Computer Society, (2015)Blessing or curse? A survey on the Impact of Generative AI on Fake News., , and . CoRR, (2024)Monitoring traffic in computer networks with dynamic distributed remote packet capturing., , and . ICC, page 5759-5764. IEEE, (2015)A Self-Learning Network Anomaly Detection System using Majority Voting., and . INC, page 59-69. Plymouth University, (2014)Wireless access server for quality of service and location based access control in 802.11 networks., , and . ISCC, page 819-824. IEEE Computer Society, (2002)Using evolutionary dynamic optimization for monitor selection in highly dynamic communication infrastructures., , , and . GECCO (Companion), page 1672-1679. ACM, (2018)