Author of the publication

Policy management for network-based intrusion detection and prevention.

, and . NOMS (2), page 219-232. IEEE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing JMS Performance for Cloud-Based Application Servers., and . IEEE CLOUD, page 828-835. IEEE Computer Society, (2012)SPECsip infrastructure and application benchmarks., , , , , , , and . ICPE, page 425-426. ACM, (2013)End-to-End Java Security Performance Enhancements for Oracle SPARC Servers., , , , and . ICPE, page 159-166. ACM, (2016)Policy management for network-based intrusion detection and prevention., and . NOMS (2), page 219-232. IEEE, (2004)Scaling Java Virtual Machine on a many-core system., , and . ISIC, page 336-339. IEEE, (2014)Communication Middleware and Software for QoS Control in Distributed Real-Time EnvironmentsSpecifically, we consider the following innovative research components., , and . COMPSAC, page 558-564. IEEE Computer Society, (1997)Accelerating Java Streams With A Data AnalyticsHardware Accelerator., , , , , , and . ICPE, page 157-158. ACM, (2017)Routing in quasi torus networks., and . Networks, 28 (4): 195-209 (1996)Irregular Torus Networks: Deadlock Avoidance and Throughput Analysis., and . INFOCOM, page 312-321. IEEE Computer Society, (1993)i-MIRROR: A Software Managed Die-Stacked DRAM-Based Memory Subsystem., , , and . SBAC-PAD, page 82-89. IEEE Computer Society, (2015)