Author of the publication

A Proposal for Anomaly Traffic Detection in the IP Multimedia Subsystem Using Tanimoto Distance and a Modified Moving Average.

, , and . SAINT, page 278-283. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SIP Flooding Attack Detection Using a Trust Model and Statistical Algorithms., , , and . J. Inf. Process., 22 (2): 118-129 (2014)Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software., , and . SAINT Workshops, page 31. IEEE Computer Society, (2007)Nazca: A Geographic Location Service., , , , , and . SAINT Workshops, page 51. IEEE Computer Society, (2007)A Generic API for Retrieving Human-Oriented Information from Social Network Services., , , , and . SAINT Workshops, page 33. IEEE Computer Society, (2007)Obtaining Sensing Data Based on the Proximity of Sensor Nodes., , , , and . SAINT, page 409-412. IEEE Computer Society, (2008)Inter-device Communication Paradigm: Requirements Analysis for Its Security Mechanisms., , and . SAINT, page 345-348. IEEE Computer Society, (2008)Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing., , , , and . CLOSER, page 145-148. SciTePress, (2013)Trust-based SPIT detection by using call duration and social reliability., , , and . APCC, page 98-103. IEEE, (2013)Leveraging Static Probe Instrumentation for VM-based Anomaly Detection System., , , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 320-334. Springer, (2015)Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture., , , and . TRUST, volume 8564 of Lecture Notes in Computer Science, page 127-142. Springer, (2014)