Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments., , , , , , and . Int. J. Inf. Secur. Priv., 16 (1): 1-16 (2022)Grouping detection and forecasting security controls using unrestricted cooperative bargains., , , , and . Comput. Commun., (2019)Analysis and Implementation of a Pre-defined QoS Specification Methodology for VoD Systems., , , and . IMSA, page 406-411. IASTED/ACTA Press, (2001)Evaluation of theora and speex performance in IP videoconferencing., , , and . WebMedia, page 135-138. ACM, (2012)IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis., , , and . Wirel. Networks, 25 (4): 1533-1556 (2019)Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages., , , and . J. Cloud Comput., (2022)Energy-efficient node position identification through payoff matrix and variability analysis., , , , , , and . Telecommun. Syst., 65 (3): 459-477 (2017)Applying multi-correlation for improving forecasting in cyber security., , , and . ICDIM, page 179-186. IEEE, (2011)IDS 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted traffic., and . ICITST, page 1-6. IEEE, (2009)IFS - Intrusion forecasting system based on collaborative architecture., and . ICDIM, page 217-222. IEEE, (2009)