Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework., , and . Security and Management, page 397-401. CSREA Press, (2003)A Study on Security Middleware Framework for the Ubiquitous Platform., , , and . VTC Fall, page 1-5. IEEE, (2006)Executable Code Recognition in Network Flows Using Instruction Transition Probabilities., , , , , , and . IEICE Trans. Inf. Syst., 91-D (7): 2076-2078 (2008)Policy-Based Intrusion Detection and Automated Response Mechanism., , and . ICOIN (2), volume 2344 of Lecture Notes in Computer Science, page 399-408. Springer, (2002)Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks., , , , and . WISA, volume 4298 of Lecture Notes in Computer Science, page 282-296. Springer, (2006)Discovering and integrating distributed manufacturing services with semantic manufacturing capability profiles., , , , and . Int. J. Computer Integrated Manufacturing, 21 (6): 631-646 (2008)Function Call Mechanism Based Executable Code Detection for the Network Security., , , , and . SAINT, page 62-67. IEEE Computer Society, (2008)Defeating DoS Attacks Using Wavelet Analysis., and . Security and Management, page 248-252. CSREA Press, (2003)Architecture of Multimedia Service Interworking for Heterogeneous Multi-Carrier ATM Network., , and . IS&N, volume 1238 of Lecture Notes in Computer Science, page 49-60. Springer, (1997)Random Visitor: Defense against Identity Attacks in P2P Networks., , , , and . IEICE Trans. Inf. Syst., 91-D (4): 1058-1073 (2008)