Author of the publication

Application of Neural Networks for Intrusion Detection in Tor Networks.

, , , , , and . AINA Workshops, page 67-72. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An intelligent routing and CAC framework for large-scale networks based on cooperative agents., , , , , and . Computer Communications, 25 (16): 1429-1442 (2002)Scalable traceback against distributed denial of service., , , and . IJWGS, 2 (2): 221-233 (2006)Improvement of JXTA-Overlay P2P Platform: Evaluation for Medical Application and Reliability., , , , , and . IJDST, 6 (2): 45-62 (2015)A Joint Design for Distributed Stable Routing and Channel Assignment Over Multihop and Multiflow Mobile Ad Hoc Cognitive Networks., , and . IEEE Trans. Industrial Informatics, 10 (2): 1606-1615 (2014)A comparison study of Hill Climbing, Simulated Annealing and Genetic Algorithm for node placement problem in WMNs., , , , , and . J. High Speed Networks, 20 (1): 55-66 (2014)Performance evaluation of a scalable media access control protocol for single hop WDM networks., , , , , and . IJHPCN, 3 (5/6): 309-319 (2005)On Some Current Results of Graph Theory for ad-hoc Networks., and . J. Mobile Multimedia, 3 (1): 15-33 (2007)Overlay upper Clothing Textures to Still Images based on Human Pose Estimation., , , , and . J. Mobile Multimedia, 11 (1&2): 34-49 (2015)Experimental Results of a MANET Testbed for Different Settings of HELLO Packets of OLSR Protocol., , , , and . J. Mobile Multimedia, 9 (1&2): 27-38 (2013)An adaptive reservation time division multiple access control protocol for robot inter-communication., , and . IJWMC, 3 (1/2): 4-11 (2008)