Author of the publication

On the use of Sub-Space Clustering & Evidence Accumulation for traffic analysis & classification.

, , and . IWCMC, page 1016-1021. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Explainable-by-Design Ensemble Learning System to Detect Unknown Network Attacks., , , , and . CNSM, page 1-9. IEEE, (2023)Effective Prediction of V2I Link Lifetime and Vehicle's Next Cell for Software Defined Vehicular Networks: A Machine Learning Approach., , , , and . VNC, page 1-8. IEEE, (2019)Evaluating the Impact of Traffic Sampling onAATAC's DDoS Detection., and . J. Cyber Secur. Mobil., 8 (4): 419-438 (2019)Investigating adversarial attacks against Random Forest-based network attack detection systems.. NOMS, page 1-6. IEEE, (2023)Sub-Space clustering, Inter-Clustering Results Association & anomaly correlation for unsupervised network anomaly detection., , , and . CNSM, page 1-8. IEEE, (2011)Cellular Uplink Bandwidth Prediction Based on Radio Measurements., , and . MobiWac, page 111-118. ACM, (2019)Rethinking IXPs' Architecture in the Age of SDN., , , , , , , and . IEEE J. Sel. Areas Commun., 36 (12): 2667-2674 (2018)Using Distributed Tracing to Identify Inefficient Resources Composition in Cloud Applications., , , and . CloudNet, page 40-47. IEEE, (2021)Design and Deployment of a Passive Monitoring Infrastructure., , , , , , and . IWDC, volume 2170 of Lecture Notes in Computer Science, page 556-575. Springer, (2001)Toward Radio Access Network Slicing Enforcement in Multi-cell 5G System., , , and . J. Netw. Syst. Manag., 31 (1): 8 (2023)