From post

Classification of Hidden Users' Profiles in Wireless Communications.

, , и . MONAMI, том 97 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 3-16. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing the behavior of top spam botnets., , , и . ICC, стр. 6540-6544. IEEE, (2012)Joint modeling of network related events with multi-dimensional Markov Modulated Deterministic Processes., , , и . SoftCOM, стр. 1-7. IEEE, (2011)P2P-TV Service and User Characterization., , и . CIT, стр. 2612-2620. IEEE Computer Society, (2010)Using Neural Networks to Classify Internet Users., , , , и . AICT/SAPIR/ELETE, стр. 183-188. IEEE Computer Society, (2005)A Framework for Detecting Internet Applications., , и . ICOIN, том 5200 из Lecture Notes in Computer Science, стр. 455-464. Springer, (2007)Detection of Illicit Network Activities Based on Multivariate Gaussian Fitting of Multi-Scale Traffic Characteristics., , и . ICC, стр. 1-6. IEEE, (2011)Detection of Illicit Traffic using Neural Networks., , , и . SECRYPT, стр. 5-12. INSTICC Press, (2008)A multi-variate classification approach for the detection of illicit traffic., , и . SoftCOM, стр. 1-6. IEEE, (2011)Markov Modulated Bi-variate Gaussian Processes for Mobility Modeling and Location Prediction., и . Networking (1), том 6640 из Lecture Notes in Computer Science, стр. 227-240. Springer, (2011)Identification of anomalies on encrypted communications based on multi-scale behavior modeling., , , и . ICUMT, стр. 1-7. IEEE, (2011)