Author of the publication

An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection.

, , and . Pattern Recognit. Lett., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Traffic Anomaly Detection and Prevention - Concepts, Techniques, and Tools, , and . Computer Communications and Networks Springer, (2017)A survey on blockchain, SDN and NFV for the smart-home security., , , , , and . Internet Things, (2022)An effective unsupervised network anomaly detection method., , and . ICACCI, page 533-539. ACM, (2012)Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach., , and . ARES, page 20:1-20:10. ACM, (2021)Towards Post-disaster Damage Assessment using Deep Transfer Learning and GAN-based Data Augmentation., , , and . ICDCN, page 372-377. ACM, (2023)Unsupervised root-cause identification of software bugs in 5G RAN., , and . CCNC, page 624-630. IEEE, (2022)Anomaly Detection and Resolution on the Edge: Solutions and Future Directions., , and . SOSE, page 227-238. IEEE, (2023)Few-Shot Anomaly Detection in Text with Deviation Learning., , , and . ICONIP (2), volume 14448 of Lecture Notes in Computer Science, page 425-438. Springer, (2023)Adversarial Impact on Anomaly Detection in Cloud Datacenters., , , and . PRDC, page 188-197. IEEE, (2019)SURE-H: A Secure IoT Enabled Smart Home System., , and . WF-IoT, page 59-63. IEEE, (2019)