Author of the publication

A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts.

, , , , , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 247-253. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Adaptive Honeypot System to Capture IPv6 Address Scans., , , , and . CyberSecurity, page 165-172. IEEE Computer Society, (2012)Host-Centric Site-Exit Router Selection in IPv6 Site Multihoming Environment., and . AINA Workshops, page 696-703. IEEE Computer Society, (2011)Performance evaluation of an OpenFlow-based mirroring switch on a laptop/raspberry Pi.. CFI, page 20:1-20:2. ACM, (2014)A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts., , , , , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 247-253. Springer, (2007)A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System., , , , and . IEICE Trans. Inf. Syst., 91-D (5): 1282-1291 (2008)Research on Integrated Authentication Using Passwordless Authentication Method., , , , , , and . COMPSAC (1), page 682-685. IEEE Computer Society, (2017)Enhancing Indoor Millimeter Radio Communication: A Probabilistic Approach to RSS Map Estimation., , , , , and . CCNC, page 241-247. IEEE, (2024)An Agent-Based Approach to Evaluation of Workflow Support Systems., , , , , , and . C5, page 51-55. IEEE Computer Society, (2010)A Mathematical Analysis of 2-Tiered Hybrid Broadcasting Environments., , and . 3PGCIC, volume 96 of Lecture Notes in Networks and Systems, page 454-460. Springer, (2019)Automatic Address Assignment for IPv6 End-to-End Multihoming Sites., , , and . ICITA (2), page 755-758. IEEE Computer Society, (2005)