Author of the publication

Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed.

, , , , , , , , , , , , , , , , , , , , and . IEEE J. Sel. Areas Commun., 24 (10): 1889-1900 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bringing legal knowledge to the public by constructing a legal question bank using large-scale pre-trained language model., , , , , , , and . Artif. Intell. Law, 32 (3): 769-805 (September 2024)Hardware Test on Movement Compatibility for Rotary Control and Digital Display., and . IMECS, page 721-725. Newswood Limited, (2006)A Study on Movement Compatibility for Lever Control and Circular Display with Computer Simulated Test., and . IMECS, page 625-629. Newswood Limited, (2006)Simulation of flow control schemes- backpressure and window control.. Simulation, 58 (2): 95-107 (1992)Delegation of signing and decryption rights using pki proxy memo., , , , , , , and . IASTED Conf. on Software Engineering, page 281-285. IASTED/ACTA Press, (2004)Fidelitous Augmentation of Human Accelerometric Data for Deep Learning., , , , , and . HealthCom, page 194-195. IEEE, (2023)Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed., , , , , , , , , and 11 other author(s). IEEE J. Sel. Areas Commun., 24 (10): 1889-1900 (2006)Risk Management of Corporate Confidential Information in Digital Form., , , , , , and . COMPSAC, page 88-89. IEEE Computer Society, (2004)Separable and Anonymous Identity-Based Key Issuing., , , , , , , , and . IACR Cryptology ePrint Archive, (2004)MIX-Crowds, an Anonymity Scheme for File Retrieval Systems., and . INFOCOM, page 1170-1178. IEEE, (2009)