Author of the publication

Learning Automata Representation of Network Protocol by Grammar Induction.

, and . WISM, volume 6318 of Lecture Notes in Computer Science, page 220-227. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring the application-layer DDoS attacks for popular websites., and . IEEE/ACM Trans. Netw., 17 (1): 15-25 (2009)An automatic application signature construction system for unknown traffic., , and . Concurr. Comput. Pract. Exp., 22 (13): 1927-1944 (2010)An integrated mobility and traffic model for resource allocation in wireless networks., , and . WOWMOM, page 39-47. ACM, (2000)Centralized Botnet Detection by Traffic Aggregation., and . ISPA, page 86-93. IEEE Computer Society, (2009)Multisource dissemination in content-centric networking., , and . NOF, page 1-5. IEEE, (2013)A new prefetch cache scheme., and . GLOBECOM, page 350-355. IEEE, (2000)Measuring the Normality of Web Proxies' Behavior Based on Locality Principles., and . NPC, volume 5245 of Lecture Notes in Computer Science, page 61-73. Springer, (2008)Practical implementation of an efficient forward-backward algorithm for an explicit-duration hidden Markov model., and . IEEE Trans. Signal Process., 54 (5): 1947-1951 (2006)Hidden semi-Markov models. Artificial Intelligence, 174 (2): 215-243 (February 2010)A Novel Model for Detecting Application Layer DDoS Attacks., and . IMSCCS (2), page 56-63. IEEE Computer Society, (2006)0-7695-2581-4.