Author of the publication

An implementation of tracing attacks on advanced persistent threats by using actors model.

, , and . SCIS&ISIS, page 1316-1320. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Mean Value Analysis approach to transaction performance evaluation of multi-server systems., , , and . Concurr. Comput. Pract. Exp., 22 (10): 1267-1285 (2010)The JRA-25 Reanalysis, , , , , , , , , and 7 other author(s). Journal of the Meteorological Society of Japan, 85 (3): 369--432 (2007)Analyzing the Effect of Moving Target Defense for a Web System., , and . Int. J. Netw. Comput., 9 (2): 188-200 (2019)Handling class Imbalance problem in Intrusion Detection System based on deep learning., , and . Int. J. Netw. Comput., 12 (2): 467-492 (2022)Utilizing Multi-Networks Task Scheduler for Streaming Applications., , and . ICPP Workshops, page 25-30. IEEE Computer Society, (2008)Characterizing Transactions with Data Transfer on Multi-server Systems., , , , , and . INCoS, page 404-408. IEEE Computer Society, (2010)Tracing Advanced Persistent Threats in Networked Systems., , , , and . SafeConfig, page 179-187. Springer, (2012)An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS., , , and . CANDAR, page 239-244. IEEE, (2019)A New Task Scheduling Method for Distributed Programs which Require Memory Management in Grids., and . SAINT Workshops, page 666-673. IEEE Computer Society, (2004)Efficient Shortest Path Routing Algorithms for Distributed XML Processing., , , and . WEBIST, page 265-272. ScitePress, (2019)