Author of the publication

Natural Laws as a Baseline for Network Anomaly Detection.

, , and . Trustcom/BigDataSE/ISPA, page 370-377. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy Based Management for Security in Cloud Computing., , , , , , and . STA Workshops, volume 187 of Communications in Computer and Information Science, page 130-137. Springer, (2011)Managing runtime re-engineering of a System-of-Systems for cyber security., and . SoSE, page 13-18. IEEE, (2011)Security Risk Assessment and Risk Treatment for Integrated Modular Communication., , and . ARES, page 503-509. IEEE Computer Society, (2016)RECOUP: efficient reconfiguration for wireless sensor networks., , and . MobiQuitous, ICST / ACM, (2008)Natural Laws as a Baseline for Network Anomaly Detection., , and . Trustcom/BigDataSE/ISPA, page 370-377. IEEE, (2016)Policy based network management in high assurance environments., and . GLOBECOM, page 2151-2157. IEEE, (2004)Editorial: Special issue on Identity Protection and Management., , and . J. Inf. Secur. Appl., 19 (1): 1 (2014)Fixed Point Arithmetic in SHE Scheme., , , and . IACR Cryptol. ePrint Arch., (2016)Fixed-Point Arithmetic in SHE Schemes., , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 401-422. Springer, (2016)Simultaneously Colouring the Edges and Faces of Plane Graphs.. J. Comb. Theory B, 69 (2): 219-221 (1997)