Author of the publication

A multi-variate classification approach for the detection of illicit traffic.

, , and . SoftCOM, page 1-6. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A multi-variate classification approach for the detection of illicit traffic., , and . SoftCOM, page 1-6. IEEE, (2011)Detection of Illicit Network Activities Based on Multivariate Gaussian Fitting of Multi-Scale Traffic Characteristics., , and . ICC, page 1-6. IEEE, (2011)Identification of anomalies on encrypted communications based on multi-scale behavior modeling., , , and . ICUMT, page 1-7. IEEE, (2011)Classification of Hidden Users' Profiles in Wireless Communications., , and . MONAMI, volume 97 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-16. Springer, (2011)A real-time traffic classification approach., , and . ICITST, page 620-626. IEEE, (2011)Discriminating Internet Applications based on Multiscale Analysis., , and . NGI, page 1-7. IEEE, (2009)Using multiscale traffic analysis to detect WPS attacks., , , and . ICC Workshops, page 1020-1025. IEEE, (2013)A Facebook event collector framework for profile monitoring purposes., , , , and . ISCC, page 1-6. IEEE Computer Society, (2014)Implementing and evaluating improved MAC efficiency through payload extension in 802.11n networks., , and . ICC Workshops, page 982-987. IEEE, (2013)An optimization model for temporal video lecture segmentation using word2vec and acoustic features., and . WebMedia, page 513-520. ACM, (2019)