Author of the publication

Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification.

, , and . ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 981-989. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transient Time Analysis of Network Security Survivability Using DEVS., and . AIS, volume 3397 of Lecture Notes in Computer Science, page 607-616. Springer, (2004)Proactive Fault Management with Virtualization for Software Aging., , and . Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, volume 149 of Studies in Computational Intelligence, Springer, (2008)Fault-Tolerance Data Aggregation for Clustering Wireless Sensor Network., and . Wireless Personal Communications, 51 (1): 179-192 (2009)A survivability model in wireless sensor networks., , , and . Comput. Math. Appl., 64 (12): 3666-3682 (2012)Privacy Preserving Support Vector Machines in Wireless Sensor Networks., , and . ARES, page 1260-1265. IEEE Computer Society, (2008)Survival of the Internet Applications: A Cluster Recovery Model., , and . CCGRID, page 33. IEEE Computer Society, (2006)Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection., , and . CISC, volume 3822 of Lecture Notes in Computer Science, page 279-289. Springer, (2005)Density Mining Based Resilient Data Aggregation for Wireless Sensor Network., and . NCM (1), page 261-266. IEEE Computer Society, (2008)Quantitative intrusion intensity assessment for intrusion detection systems., , , and . Secur. Commun. Networks, 5 (10): 1199-1208 (2012)Security Modeling and Analysis of a SDN Based Web Service., , , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 746-756. Springer, (2015)