Author of the publication

A New Architecture for Enhancing the Security of E-Mail System.

, , , and . Security and Management, page 449-454. CSREA Press, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Imprecise DCT Computation Model for Real-Time Applications., , , , , and . Multimedia Technology and Applications, page 153-161. (1996)Real-Time Scheduling Algorithm for Minimizing Maximum Weighted Error with O(N log N + cN) Complexity., , , and . Inf. Process. Lett., 67 (6): 311-315 (1998)Design issues on a popularity-independent video-on-demand server., , , , and . IEEE Trans. Consumer Electronics, 45 (2): 455-464 (1999)An Intelligent Topic-Specific Crawler Using Degree of Relevance., , , , and . IDEAL, volume 3177 of Lecture Notes in Computer Science, page 491-498. Springer, (2004)Autonomous and Dependable Recovery Scheme in UPnP Network Settings., , , and . IDEAL, volume 3578 of Lecture Notes in Computer Science, page 501-506. Springer, (2005)Accelerating firewall through intelligent self-learning., , , , , , and . SMC, page 3524-3529. IEEE, (2003)Reducing Worm Detection Time and False Alarm in Virus Throttling., , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 297-302. Springer, (2005)Pairwise Test Case Generation Based on Module Dependency., , and . IEICE Trans. Inf. Syst., 89-D (11): 2811-2813 (2006)Modeling software requirement with timing diagram and Simulink Stateflow., , , and . Inf. Softw. Technol., 53 (5): 484-493 (2011)Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning., , , and . IDEAL, volume 2690 of Lecture Notes in Computer Science, page 286-295. Springer, (2003)