Author of the publication

D-SAT: Detecting SYN Flooding Attack by Two-Stage Statistical Approach.

, , and . SAINT, page 430-436. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of the dexterous manipulator and the force sensor for Minimally Invasive Surgery., , and . ICARA, page 524-528. IEEE, (2009)Customer expectation level in mobile data services., , and . Mobile HCI, page 259-262. ACM, (2005)Visualisation of Distributed Systems Simulation Made Simple., , , and . CloudCom, page 309-312. IEEE, (2019)Decentralized Admission Control for High-Throughput Key-Value Data Stores., , , and . CCGrid, page 503-512. IEEE Computer Society, (2018)Robust Scheduling for Large-Scale Distributed Systems., , , and . TrustCom, page 38-45. IEEE, (2020)QS-Ware: The Middleware for Providing QoS and Secure Ability to Web Server., , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 988-997. Springer, (2004)Dynamic Control of CPU Usage in a Lambda Platform., , , , and . CLUSTER, page 234-244. IEEE Computer Society, (2018)Development of a two DOF needle driver for CT-guided needle insertion-type interventional robotic system., , , and . RO-MAN, page 470-475. IEEE, (2017)Data forgery detection for vehicle black box., and . ICTC, page 636-637. IEEE, (2014)Constant current charging in series-series compensated non-radiative wireless power link., , , , , and . ISCAS, page 2792-2795. IEEE, (2013)