Author of the publication

Lattice Structural Analysis on Sniffing to Denial of Service Attacks.

, , , and . International Journal of Computer Networks & Communications (IJCNC), 11 (4): 101-119 (July 2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective mining on large databases for intrusion detection., , , , and . ISBAST, page 204-207. IEEE, (2014)Using process mining to business process distribution., , , and . SAC, page 2140-2145. ACM, (2009)Towards secure model for SCADA systems., , , , and . CyberSec, page 60-64. IEEE, (2012)Active warden as the main hindrance for steganography information retrieval., , , , and . CAMP, page 277-280. IEEE, (2012)Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation., , , and . FNC/MobiSPC, volume 56 of Procedia Computer Science, page 370-375. Elsevier, (2015)A Performance Evaluation of Preference Evaluation Techniques in Real High Dimensional Database., , , , and . ANT/MobiWIS, volume 10 of Procedia Computer Science, page 894-901. Elsevier, (2012)Artificial Immune Recognition System with Nonlinear Resource Allocation Method and Application to Traditional Malay Music Genre Classification., , , , and . ICARIS, volume 5132 of Lecture Notes in Computer Science, page 132-141. Springer, (2008)Efficient Skyline Processing Algorithm over Dynamic and Incomplete Database., , , , and . iiWAS, page 190-199. ACM, (2018)A Hybrid Scheme for Face Template Protection., , , and . IMCOM, page 6:1-6:7. ACM, (2016)File Integrity Monitor Scheduling Based on File Security Level Classification., , , and . ICSECS (2), volume 180 of Communications in Computer and Information Science, page 177-189. Springer, (2011)