Author of the publication

Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness.

, and . IEEE Journal on Selected Areas in Communications, 24 (10): 1942-1954 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wavelet Methods for the Detection of Anomalies and their Application to Network Traffic Analysis., , , , and . Quality and Reliability Eng. Int., 22 (8): 953-969 (2006)MVSS: An Active Storage Architecture., and . IEEE Trans. Parallel Distrib. Syst., 14 (10): 993-1005 (2003)Design, Analysis, and Simulation of I/O Architectures for Hypercube., and . IEEE Trans. Parallel Distrib. Syst., 1 (2): 140-151 (1990)Performance Evaluation of Multiple-Disk I/O Systems., and . ICPP (1), page 315-318. Pennsylvania State University Press, (1989)Disjoint Multi-Path Routing and Failure Recovery., and . ICC, page 1-6. IEEE, (2010)MVSS: Multi-view Storage System., and . ICDCS, page 31-38. IEEE Computer Society, (2001)Data organization in a hybrid storage system., and . ICNC, page 583-587. IEEE Computer Society, (2012)A Fault Secure Dictionary Machine., and . ICDE, page 104-110. IEEE Computer Society, (1987)LTCP: improving the performance of TCP in highspeed networks., , and . Computer Communication Review, 36 (1): 41-50 (2006)Fault Tolerance Techniques for Systolic Arrays., , , , , and . IEEE Computer, 20 (7): 65-75 (1987)