Author of the publication

Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack.

, , , and . NBiS, page 271-278. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of a Defence Method against Slow HTTP DoS Attack., , , and . ISITA, page 316-320. IEEE, (2018)An Efficient RP (Rendezvous Point) Replacement Mechanism for Rendezvous-Based Multicast Routing., , and . ICDCS Workshops, page 514-518. IEEE Computer Society, (2003)A Defense Method against Distributed Slow HTTP DoS Attack., , , and . NBiS, page 152-158. IEEE Computer Society, (2016)A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System., , , and . AINA, page 438-445. IEEE Computer Society, (2010)Development of Security Scanner with High Portability and Usability., , and . AINA, page 407-410. IEEE Computer Society, (2005)Development of Security Scanner with High Usability., , and . AINA (1), page 139-144. IEEE Computer Society, (2004)EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks., and . J. Commun., 12 (6): 304-311 (2017)On the Performance Enhancement of Vehicular Ad Hoc Network for Transportation Cyber Physical Systems., and . WCNC Workshops, page 1-6. IEEE, (2017)Composition method of communication system specifications in asynchronous model and its support system., , , , , , , and . ICON, page 64-69. IEEE, (2001)Support System for Constructing Communication Services and Protocols Based on Compositional Approach., , , , and . DEXA Workshop, page 15-22. IEEE Computer Society, (2000)