Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Android malware detection using multivariate time-series technique., and . APNOMS, page 198-202. IEEE, (2015)A method for service identification of SSL/TLS encrypted traffic with the relation of session ID and Server IP., , , , and . APNOMS, page 487-490. IEEE, (2015)Applicaion-level traffic analysis of smartphone users using embedded agents., and . APNOMS, page 1-4. IEEE, (2012)Autonomic Resilient Internet-of-Things(IoT)Management., , and . CoRR, (2015)An approach for failure recognition in IP-based industrial control networks and systems., , , and . Int. J. Netw. Manag., 22 (6): 477-493 (2012)Experimental Comparison of Machine Learning Models in Malware Packing Detection., , , and . APNOMS, page 377-380. IEEE, (2020)Towards Management Requirements of Future Internet., , , , and . APNOMS, volume 5297 of Lecture Notes in Computer Science, page 156-166. Springer, (2008)Automatic Configuration for VPN Using Active XML., and . IPOM, volume 3751 of Lecture Notes in Computer Science, page 173-180. Springer, (2005)Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection., , , , , and . Secur. Commun. Networks, (2017)OMA DM-based remote software fault management for mobile devices., , , , and . Int. J. Netw. Manag., 19 (6): 491-511 (2009)