Author of the publication

Generating adaptive network data visualization to different levels of users.

, and . CCIS, page 771-775. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Databases using Novell Netware., and . Applied Informatics, page 273-275. IASTED/ACTA Press, (1994)kENFIS: kNN-based evolving neuro-fuzzy inference system for computer worms detection., , and . J. Intell. Fuzzy Syst., 26 (4): 1893-1908 (2014)Detecting Botnet Activities Based on Abnormal DNS traffic, , , and . CoRR, (2009)Study on Advanced Visualization Tools In Network Monitoring Platform., , , and . EMS, page 445-449. IEEE Computer Society, (2009)Simulation of routing in nano-manipulation for creating pattern with atomic force microscopy using hybrid PSO-AS., , , , and . SpringSim (ANSS), page 213-219. SCS/ACM, (2011)1-930638-56-6.A Sequential Hierarchical Superset Implementation of Neocortex Memory System and its Case Study of Automated Network Forensic Analysis., , , and . IC-AI, page 490-495. CSREA Press, (2008)Novel algorithms to ensure smooth and unobtrusive handover among positioning systems., , , and . CAMP, page 229-234. IEEE, (2012)Research Proposal: an Intrusion Detection System Alert Reduction and Assessment Framework based on Data Mining., , , , and . J. Comput. Sci., 9 (4): 421-426 (2013)Socket Level Implementation of MCS Conferencing System in IPv6., , and . ICOIN, volume 2662 of Lecture Notes in Computer Science, page 460-472. Springer, (2003)A dual stack IPv4/IPv6 testbed for malware detection in IPv6 networks., , and . ICCSCE, page 168-170. IEEE, (2011)