Author of the publication

Performance Estimation of TCP under SYN Flood Attacks.

, and . CISIS, page 92-99. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Nakashima, Takuo
add a person with the name Nakashima, Takuo
 

Other publications of authors with the same name

Queue Length Behavior on Restricted Link Under Bursty Self-similar TCP Traffic.. AINA Workshops, page 452-457. IEEE Computer Society, (2009)Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method., , and . NBiS, page 221-228. IEEE Computer Society, (2011)Flooding Features for the AODV Protocol., and . ICWN, page 468-473. CSREA Press, (2009)Performance Estimation of TCP under SYN Flood Attacks., and . CISIS, page 92-99. IEEE Computer Society, (2007)Statistical Analysis of Propagation Properties with Heavy-Tailedness.. International Conference on Internet Computing, page 328-334. CSREA Press, (2004)An Anomaly Detection System Based on Chi-Square Method with Dynamic BIN Algorithm., , , and . BWCCA, page 549-554. IEEE Computer Society, (2011)DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number., , , and . IIH-MSP, page 206-209. IEEE Computer Society, (2009)Self-Similar Property for TCP Traffic under the Bottleneck Bandwidth Restrainment.. IIH-MSP, page 193-196. IEEE Computer Society, (2006)Property Analysis of Heavy-tailed Traffic by Simulator., and . ICICIC (1), page 44-47. IEEE Computer Society, (2006)A Detective Method for SYN Flood Attacks., and . ICICIC (1), page 48-51. IEEE Computer Society, (2006)