Author of the publication

Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs.

, , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 214-225. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximate data mining in very large relational data., , , and . ADC, volume 49 of CRPIT, page 3-13. Australian Computer Society, (2006)Predict+Optimise with Ranking Objectives: Exhaustively Learning Linear Functions., , , , , , and . IJCAI, page 1078-1085. ijcai.org, (2019)Robust and Accurate Short-Term Load Forecasting: A Cluster Oriented Ensemble Learning Approach., , and . IJCNN, page 1-8. IEEE, (2019)Privacy-Preserving Collaborative Anomaly Detection for Participatory Sensing., , , , and . PAKDD (1), volume 8443 of Lecture Notes in Computer Science, page 581-593. Springer, (2014)Improving load forecasting based on deep learning and K-shape clustering., , , , and . IJCNN, page 4134-4141. IEEE, (2017)CESVM: Centered Hyperellipsoidal Support Vector Machine Based Anomaly Detection., , and . ICC, page 1610-1614. IEEE, (2008)A scalable sampling scheme for clustering in network traffic analysis., , and . Infoscale, volume 304 of ACM International Conference Proceeding Series, page 38. ACM, (2007)Parking availability prediction for sensor-enabled car parks in smart cities., , and . ISSNIP, page 1-6. IEEE, (2015)Fuzzy c-Shape: A new algorithm for clustering finite time series waveforms., , , , and . FUZZ-IEEE, page 1-8. IEEE, (2017)Extension of iVAT to asymmetric matrices., , , and . FUZZ-IEEE, IEEE, (2013)