Author of the publication

A Network Forensics System for Information Leak Events.

, , and . WASA, volume 7992 of Lecture Notes in Computer Science, page 54-63. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applications and Trends of High Performance Computing for Electric Power Systems: Focusing on Smart Grid., , and . IEEE Trans. Smart Grid, 4 (2): 922-931 (2013)Quality of Service Control and Performance Analysis of a Gigabit Network., and . Int. J. Comput. Their Appl., 11 (3): 162-170 (2004)A Study of Parallel Monitoring Algorithm in ATM Network., , and . Int. J. Comput. Their Appl., 12 (4): 195-201 (2005)Optimal Maintenance Policies for Machines Subject to Deterioration and Intermittent Breakdowns., and . IEEE Trans. Syst. Man Cybern., 5 (3): 396-398 (1975)Performance analysis of sampling-based turbo coded NCQFSK for image data transmission., , , and . SpringSim (ANSS), page 12. SCS/ACM, (2013)Anti-spoofing cooperative localization in cellular networks., , and . SpringSim (CNS), page 4. ACM, (2014)A robust malicious user detection scheme in cooperative spectrum sensing., , , and . GLOBECOM, page 4856-4861. IEEE, (2012)Optimal Call Admission Control Policy In Wireless Networks., , and . WCNC, page 2975-2979. IEEE, (2008)A Deep Learning Approach for Network Intrusion Detection System., , , and . EAI Endorsed Trans. Security Safety, 3 (9): e2 (2016)Optimal CAC Policy in Multimedia Wireless Networks with Reservation Channel Schemes., , and . GLOBECOM, page 1443-1447. IEEE, (2008)