Author of the publication

ACTM: Anomaly Connection Tree Method to detect Silent Worms.

, , , , and . AINA (1), page 901-908. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stream Authentication Scheme for the use over the IP Telephony., , , and . AINA (2), page 164-169. IEEE Computer Society, (2004)Development and Evaluation of a Technical Information Sharing System for International Remote Medical Education., , , , , and . AHFE (17), volume 275 of Lecture Notes in Networks and Systems, page 1090-1098. Springer, (2021)An Exploratory Analysis of Technical Issues in Remote Education Between International Medical Institutions., , , , , and . AHFE (17), volume 1217 of Advances in Intelligent Systems and Computing, page 181-188. Springer, (2020)A Quantitative Analysis of Barriers to International Telemedicine Education: The Case of the Philippines., , , , , , , and . ICT4AWE, page 75-80. SCITEPRESS, (2023)Developing Evaluation Criteria for Engineering Training Programs in Remote Medical Education in Asia., , , , , , , , and . TALE, page 1-5. IEEE, (2021)Examination of Forwarding Obstruction Attacks in Structured Overlay Networks., , , and . ARES, page 1340-1345. IEEE Computer Society, (2008)Authenticating Video Streams., , , , and . AINA (1), page 863-868. IEEE Computer Society, (2006)ACTM: Anomaly Connection Tree Method to detect Silent Worms., , , , and . AINA (1), page 901-908. IEEE Computer Society, (2006)An Image Authentication Scheme Considering Privacy $#8212; A First Step towards Surveillance Camera Authentication., , , , and . AINA, page 253-256. IEEE Computer Society, (2005)