Author of the publication

Adaptive Architecture for Web Server Survivability.

, , , , and . ADVIS, volume 3261 of Lecture Notes in Computer Science, page 172-180. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dependable Localization Algorithm for Survivable Belt-Type Sensor Networks., , , , and . Sensors, 17 (12): 2767 (2017)SVM Approach with a Genetic Algorithm for Network Intrusion Detection., , and . ISCIS, volume 3733 of Lecture Notes in Computer Science, page 224-233. Springer, (2005)A New DDoS Detection Model Using Multiple SVMs and TRA., , , , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 976-985. Springer, (2005)Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop., , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 390-397. Springer, (2004)A Hybrid Trust Management Framework for Vehicular Social Networks., , , , and . CSoNet, volume 9795 of Lecture Notes in Computer Science, page 214-225. Springer, (2016)An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System., , , , and . Sensors, 18 (6): 1888 (2018)Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process., , and . Mob. Inf. Syst., (2020)Simple Key Agreement and Its Efficiency Analysis for Grid Computing Environments., , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 891-894. Springer, (2004)AE-LSTM Based Anomaly Detection System for Communication Over DNP 3.0., , and . WISA, volume 14402 of Lecture Notes in Computer Science, page 91-104. Springer, (2023)A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors., , , and . NBiS, page 573-577. IEEE Computer Society, (2011)