Influence of Voltage Harmonics on Partial Discharge Diagnostics in Electric Motors Fed by Variable-Frequency Drives | 0 | 0.34 | 2022 |
Design, Implementation and Evaluation of a LoRa Packet Generator for Forest Environments | 0 | 0.34 | 2021 |
Rare-Event Simulation for the Hitting Time of Gaussian Processes. | 0 | 0.34 | 2020 |
Real Time Attack Detection with Deep Learning | 0 | 0.34 | 2019 |
A Novel Auction Based Scheduling Algorithm in Industrial Internet of Things Networks. | 0 | 0.34 | 2018 |
Improving Stability Of Pca-Based Network Anomaly Detection By Means Of Kernel-Pca | 2 | 0.44 | 2018 |
Waterfall Traffic Classification: A Quick Approach to Optimizing Cascade Classifiers. | 0 | 0.34 | 2017 |
Power Consumption-Aware Virtual Machine Placement in Cloud Data Center. | 3 | 0.39 | 2017 |
An energy efficient centralized scheduling scheme in TSCH networks | 4 | 0.39 | 2017 |
A novel allocation strategy for virtual machines in software defined data center | 0 | 0.34 | 2017 |
Impact of Histogram Construction Techniques on Information - Theoretic Anomaly Detection. | 0 | 0.34 | 2017 |
A secure and privacy-preserving approach to communications in smart grids. | 0 | 0.34 | 2016 |
Statistical Network Anomaly Detection: An Experimental Study. | 1 | 0.42 | 2016 |
A Novel Histogram-based Network Anomaly Detection. | 0 | 0.34 | 2016 |
A novel SDN controller for traffic recovery and load balancing in data centers | 0 | 0.34 | 2016 |
A SIP-Based Home Gateway for Domotics Systems: From the Architecture to the Prototype. | 0 | 0.34 | 2016 |
Delays in IP Routers, a Markov Model. | 0 | 0.34 | 2016 |
The Fluid Flow Approximation of the TCP Vegas and Reno Congestion Control Mechanism. | 1 | 0.39 | 2016 |
Histogram cloning and CuSum: An experimental comparison between different approaches to Anomaly Detection | 0 | 0.34 | 2015 |
Waterfall Traffic Identification: Optimizing Classification Cascades. | 1 | 0.35 | 2015 |
Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection. | 0 | 0.34 | 2015 |
A Fuzzy Logic Approach For Resources Allocation In Cloud Data Center | 1 | 0.36 | 2015 |
OpenCounter: Counting unknown flows in Software Defined Networks | 1 | 0.35 | 2015 |
Improving Pca-Based Anomaly Detection By Using Multiple Time Scale Analysis And Kullback-Leibler Divergence | 13 | 0.64 | 2014 |
Dns-Class: Immediate Classification Of Ip Flows Using Dns | 6 | 0.52 | 2014 |
Waterfall: Rapid Identification of IP Flows Using Cascade Classification. | 10 | 0.54 | 2014 |
A Distributed Privacy-Aware Architecture for Communication in Smart Grids | 0 | 0.34 | 2013 |
Design and Implementation of a Testbed for the Security Assessment of MANETs. | 0 | 0.34 | 2013 |
Virtual Machines Migration In A Cloud Data Center Scenario: An Experimental Analysis | 4 | 0.47 | 2013 |
Sketch-based multidimensional IDS: A new approach for network anomaly detection | 6 | 0.53 | 2013 |
Skype-Hunter: A real-time system for the detection and classification of Skype traffic | 21 | 0.96 | 2012 |
Detecting anomalies in backbone network traffic: a performance comparison among several change detection methods | 13 | 0.61 | 2012 |
Energy saving heuristics in backbone networks. | 6 | 0.39 | 2012 |
A Friendliness Study of TCP Linux Variants. | 0 | 0.34 | 2012 |
Behavior analysis of TCP Linux variants | 9 | 0.57 | 2012 |
WAVE-CUSUM: Improving CUSUM performance in network anomaly detection by means of wavelet analysis | 7 | 0.57 | 2012 |
Combining wavelet analysis and CUSUM algorithm for network anomaly detection | 0 | 0.34 | 2012 |
A Novel PCA-Based Network Anomaly Detection | 5 | 0.50 | 2011 |
Design and performance evaluation of service overlay networks topologies | 3 | 0.42 | 2011 |
A Behavioral Study of TCP Linux Variants over Satellite Networks | 0 | 0.34 | 2011 |
Forecasting the Distribution of Network Traffic for Anomaly Detection | 2 | 0.38 | 2011 |
Detecting Heavy Change in the Heavy Hitter distribution of network traffic | 2 | 0.37 | 2011 |
Combining sketches and wavelet analysis for multi time-scale network anomaly detection | 6 | 0.46 | 2011 |
Combining wavelet analysis and information theory for network anomaly detection | 1 | 0.35 | 2011 |
A new statistical method for detecting network anomalies in TCP traffic | 3 | 0.43 | 2010 |
Optimal design of Service Overlay Networks with economic and performance constraints | 3 | 0.40 | 2010 |
On the use of sketches and wavelet analysis for network anomaly detection | 7 | 0.52 | 2010 |
Regenerative analysis of a finite buffer fluid queue. | 0 | 0.34 | 2010 |
Detecting network anomalies in backbone networks | 1 | 0.35 | 2010 |
On the use of co-occurrence matrices for network anomaly detection | 1 | 0.35 | 2009 |