From post

Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarity.

, , , и . WISM, том 5854 из Lecture Notes in Computer Science, стр. 383-392. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Anonymity Scheme Based on Pseudonym in P2P Networks., , , , и . e-Forensics, том 56 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 287-293. Springer, (2010)Finding community structure in complex network based on latent variables., , , и . CHINACOM, стр. 239-244. IEEE, (2012)A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold., , , и . ICICS, том 5927 из Lecture Notes in Computer Science, стр. 283-292. Springer, (2009)A Low Cost and Reliable Anonymity Scheme in P2P Reputation Systems with Trusted Third Parties., , , и . GLOBECOM, стр. 2201-2205. IEEE, (2008)A Dynamic Anonymous P2P Reputation System Based on Trusted Computing Technology., , , и . GLOBECOM, стр. 332-337. IEEE, (2007)A Community Divisive Algorithm Using Local Weak Links., , , и . ICITCS, стр. 1-5. IEEE Computer Society, (2014)Analysis and Improvement of an Anonymity Scheme for P2P Reputation Systems., , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (10): 2893-2895 (2008)DCT fingerprint classifier based group fingerprint., , и . ICAILP, стр. 292-295. IEEE, (2014)Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarity., , , и . WISM, том 5854 из Lecture Notes in Computer Science, стр. 383-392. Springer, (2009)