Author of the publication

Protocol oblivious classification of multimedia traffic.

, , , , and . Security and Communication Networks, 4 (4): 357-371 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Bloom Filter Array for Network Anomaly Detection., , , and . GLOBECOM, IEEE, (2006)Location Privacy Protection in Mobile Wireless Networks., , and . The Handbook of Mobile Middleware, Auerbach Publications/CRC, (2006)Robust and efficient detection of DDoS attacks for large-scale internet., , , , and . Computer Networks, 51 (18): 5036-5056 (2007)Kernel-based feature extraction under maximum margin criterion., , , and . J. Visual Communication and Image Representation, 23 (1): 53-62 (2012)Identifying hidden voice and video streams., , , , and . Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security, volume 7344 of SPIE Proceedings, page 73440F. SPIE, (2009)An efficient data structure for network anomaly detection., , , and . Security and Communication Networks, 1 (2): 107-124 (2008)Protocol oblivious classification of multimedia traffic., , , , and . Security and Communication Networks, 4 (4): 357-371 (2011)