Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy., , , and . J. Information Security, 3 (1): 18-24 (2012)A Low Cost Worm Detection Technique based on Flow Payload Similarity., , , and . WEBIST (1), page 414-417. INSTICC Press, (2007)A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages., , , , , and . CNSR, page 158-165. IEEE Computer Society, (2009)Development of a WLAN based monitoring system for group activity measurement in real-time., , , , , , , , , and . J. Commun. Networks, 13 (2): 86-94 (2011)An Efficient Signature-Based Approach for Automatic Detection of Internet Worms over Large-Scale Networks., , , , , and . ICC, page 2364-2369. IEEE, (2006)Discrimination of similar characters with a nonlinear compound discriminant function., , , and . Syst. Comput. Jpn., 38 (11): 36-48 (2007)Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures., , , and . ISM, page 680-685. IEEE Computer Society, (2005)Retinex-based signal enhancement for image dark regions., , and . ICSIPA, page 205-209. IEEE, (2017)A Reliable Network Identification Method Based on Transition Pattern of Payload Length., , , and . GLOBECOM, page 1915-1919. IEEE, (2008)A Network-based Anomaly Detection System using Multiple Network Features., , and . WEBIST (1), page 410-413. INSTICC Press, (2007)