Author of the publication

Resistance Analysis to Intruders' Evasion of Detecting Intrusion.

, , and . ISC, volume 4176 of Lecture Notes in Computer Science, page 383-397. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resistance Analysis to Intruders' Evasion of Detecting Intrusion., , and . ISC, volume 4176 of Lecture Notes in Computer Science, page 383-397. Springer, (2006)Key Comparison Optimal 2-3 Trees with Maximum Utilization., and . SIAM J. Comput., 10 (3): 558-570 (1981)Binary Search Trees with Limited Rotation., and . BIT, 23 (4): 436-455 (1983)On the Construction of Weighted Time-Optimal B-Trees., and . BIT, 30 (2): 207-215 (1990)Height-Balanced Trees of Order (beta,gamma,delta).. ACM Trans. Database Syst., 10 (2): 261-284 (1985)Detecting Intruders by User File Access Patterns., , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 320-335. Springer, (2019)Detecting stepping-stones under the influence of packet jittering., , and . IAS, page 31-36. IEEE, (2013)A Portable PET Image Reconstruction System for Parallel Machines., , and . CBMS, page 137-. IEEE Computer Society, (1998)Parallel dynamic programming., , and . SPDP, page 497-500. IEEE Computer Society, (1990)Improved Thumbprint and Its Application for Intrusion Detection., and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 433-442. Springer, (2005)