Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks., , , , and . WISA, volume 7690 of Lecture Notes in Computer Science, page 285-295. Springer, (2012)Toward the SIEM architecture for cloud-based security services., , , and . CNS, page 398-399. IEEE, (2017)Design and implementation of the contents visualization system for social networks., , , and . ICITST, page 479-483. IEEE, (2013)Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System., , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 998-1006. Springer, (2004)Building a big data platform for large-scale security data analysis., , , , and . ICTC, page 976-980. IEEE, (2017)Design and Implementation of High-Performance Intrusion Detection System., , , and . ICCSA (4), volume 3046 of Lecture Notes in Computer Science, page 594-602. Springer, (2004)Performance Comparison of Relational Databases and Columnar Databases Using Bitmap Index for Fast Search of 10Gbps Network Flows., , , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 171-175. Springer, (2015)AIGG Threshold Based HTTP GET Flooding Attack Detection., , , and . WISA, volume 7690 of Lecture Notes in Computer Science, page 270-284. Springer, (2012)