Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FPGA Based Intrusion Detection System Against Unknown and Known Attacks., , , , and . PRIMA, volume 4088 of Lecture Notes in Computer Science, page 801-806. Springer, (2006)Defense Against TCP Flooding Attack., , , and . SECRYPT, page 416-420. SciTePress, (2012)Tracing Stored Program Counter to Detect Polymorphic Shellcode., , , and . IEICE Trans. Inf. Syst., 91-D (8): 2192-2195 (2008)Memory-efficient content filtering hardware for high-speed intrusion detection systems., , , , , and . SAC, page 264-269. ACM, (2007)Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique., , , and . ICC, page 1-6. IEEE, (2009)Multi-region based Clustering Analysis Method for Unknown Malicious Code Detection., , , and . Security and Management, page 417-422. CSREA Press, (2009)A Practical Approach for Detecting Executable Codes in Network Traffic., , , , , and . APNOMS, volume 4773 of Lecture Notes in Computer Science, page 354-363. Springer, (2007)High Performance Session State Management Scheme for Stateful Packet Inspection., , , and . APNOMS, volume 4773 of Lecture Notes in Computer Science, page 591-594. Springer, (2007)A channel allocation method for IEEE802.19.1 coexistence service to mitigate interferences among heterogeneous wireless networks., , and . ICUFN, page 778-783. IEEE, (2015)Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets., , , , , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 114-130. Springer, (2008)