Author of the publication

MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats.

, , , and . Symmetry, 6 (4): 997-1010 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extension of R-Tree for Spatio-temporal OLAP Operations., , and . ICDCIT, volume 4317 of Lecture Notes in Computer Science, page 438-446. Springer, (2006)Minimizing Communication in the Bitonic Sort., and . IEEE Trans. Parallel Distributed Syst., 11 (5): 459-474 (2000)The Cloud Storage Model for Manufacturing System in Global Factory Automation., , and . AINA Workshops, page 895-899. IEEE Computer Society, (2014)A Jigsaw Query Processing Technique for Web GIS., , , , , , and . ITCC, page 385-390. IEEE Computer Society, (2000)Lightweight Monocular Depth Estimation via Token-Sharing Transformer., , , , , , and . ICRA, page 4895-4901. IEEE, (2023)A Customized Deep Sleep Recommender System Using Hybrid Deep Learning., and . Sensors, 23 (15): 6670 (August 2023)Robust H∞ Sliding Mode Descriptor Observer for Fault and Output Disturbance Estimation of Uncertain Systems., , and . IEEE Trans. Automat. Contr., 57 (11): 2928-2934 (2012)Improved On-line Scaling Scheme in a Scalable and Highly Available Database., , , and . PDPTA, page 977-982. CSREA Press, (2002)On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems., and . J. Medical Systems, 38 (5): 17 (2014)SCTP with Explicit Freeze and Melt Notification for Delay Tolerant Applications., , and . IEICE Trans. Commun., 95-B (12): 3879-3881 (2012)