Author of the publication

Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS.

, , , and . SAINT, page 367-370. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection and Filtering System for DNS Water Torture Attacks Relying Only on Domain Name Information., , , , , and . J. Inf. Process., (2017)Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices., , and . CANDARW, page 279-285. IEEE, (2023)Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS., , , and . SAINT, page 367-370. IEEE Computer Society, (2010)Estimation of Driver Excitement by Semantic Differential Method and Correlation with Arousal Levels in Advanced Driver Assistance., and . SMC, page 712-717. IEEE, (2022)Detection of Unexpected Services and Communication Paths in Networked Systems., , , and . J. Inf. Process., 21 (4): 632-639 (2013)Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information., , and . CANDARW, page 253-259. IEEE, (2023)Tracing Advanced Persistent Threats in Networked Systems., , , , and . SafeConfig, page 179-187. Springer, (2012)Discovery of Unexpected Services and Communication Paths in Networked Systems., , , and . SafeConfig, page 169-178. Springer, (2012)A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information., , , and . Int. J. Inf. Sec., 19 (1): 71-81 (2020)Detection of the DNS Water Torture Attack by Analyzing Features of the Subdomain Name., , , , and . J. Inf. Process., 24 (5): 793-801 (2016)