Author of the publication

Fundamentals of Network Forensics - A Research Perspective

, and . Computer Communications and Networks Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BSS: a brokering model for service selection using integrated weighting approach in cloud environment., , and . J. Cloud Comput., 10 (1): 26 (2021)A system for mobile assisted living., and . ICNSC, page 233-237. IEEE, (2012)Dual-level defense for networks under DDoS attacks., and . SAC, page 733-734. ACM, (2010)Multiple QoS Guided Heuristic for Independent Task Scheduling in Grid., and . ICT, volume 101 of Communications in Computer and Information Science, page 136-141. Springer, (2010)Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks., and . ICISS, volume 4812 of Lecture Notes in Computer Science, page 259-262. Springer, (2007)An Evolutionary Computing Approach for Mining of Bio-medical Images., and . PCM (3), volume 3333 of Lecture Notes in Computer Science, page 523-532. Springer, (2004)A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques., , and . EISIC, page 286-289. IEEE Computer Soecity, (2011)Ant colony based rule generation for reusable software component retrieval., , and . ACM SIGSOFT Softw. Eng. Notes, 35 (2): 1-5 (2010)Forensics of Random-UDP Flooding Attacks., , , and . J. Networks, 10 (5): 287-293 (2015)Fundamentals of Network Forensics - A Research Perspective, and . Computer Communications and Networks Springer, (2016)