Author of the publication

Cross-Scale Dynamicity of Entropy and Connectivity in the Sleeping Brain.

, , , , , , , , , and . Brain Connect., 12 (9): 835-845 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time image tracking for automatic traffic monitoring and enforcement applications., , , and . Image Vis. Comput., 22 (6): 485-501 (2004)Re-examining the performance bottleneck in a NIDS with detailed profiling., and . J. Netw. Comput. Appl., 36 (2): 768-780 (2013)Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems., , , and . IEEE Commun. Surv. Tutorials, 14 (4): 1011-1020 (2012)On-the-Fly Capture and Replay Mechanisms for Multi-Port Network Devices in Operational Networks., , , and . IEEE Trans. Network and Service Management, 11 (2): 158-171 (2014)Hardware-Software Codesign for High-Speed Signature-based Virus Scanning., , , and . IEEE Micro, 29 (5): 56-65 (2009)A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning., , and . IEEE Trans. Computers, 60 (4): 594-601 (2011)Evolution and Evaluation of Internet Content Delivery., , and . International Conference on Internet Computing, page 502-505. CSREA Press, (2003)An event-based SDN architecture for network security analysis., , and . ICCST, page 159-164. IEEE, (2015)CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection., , , , , and . J. Netw. Comput. Appl., (2021)Differential Age Trajectories of White Matter Changes Between Sexes Correlate with Cognitive Performances., , , , , , and . Brain Connect., 11 (9): 759-771 (2021)