Author of the publication

Attack Intention Analysis Model for Network Forensics.

, and . ICSECS (2), volume 180 of Communications in Computer and Information Science, page 403-411. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent security in the era of AI: The key vulnerability of RC4 algorithm., , , and . ICIT, page 691-694. IEEE, (2021)A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics., , , and . SNDS, volume 335 of Communications in Computer and Information Science, page 336-346. Springer, (2012)Attack Intention Analysis Model for Network Forensics., and . ICSECS (2), volume 180 of Communications in Computer and Information Science, page 403-411. Springer, (2011)Analyzing and contrasting machine learning algorithms for Intrusion Detection System., , , , , , and . ACIT, page 1-6. IEEE, (2023)Security Challenges Review in Agile and DevOps Practices., , , , , , and . ICIT, page 102-107. IEEE, (2023)A Proposed Wireless Intrusion Detection Prevention and Attack System., and . ACIT, page 1-5. IEEE, (2018)A Comparative Study on the Performance of 64-bit ARM Processors., , , , , and . Int. J. Interact. Mob. Technol., 17 (13): 94-113 (July 2023)Examining Digital Forensic Evidence for Android Applications., , , , , , and . ACIT, page 1-8. IEEE, (2022)Generic Proactive IoT Cybercrime Evidence Analysis Model for Digital Forensics.. ICIT, page 654-659. IEEE, (2021)