Author of the publication

An improvement of IP address lookup based on rule filter analysis.

, , and . ICC Workshops, page 688-693. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing., , and . ICISSP, page 457-464. SciTePress, (2016)Web Based Service Provision - A Case Study: Electronic Design Automation., and . ICT, volume 3124 of Lecture Notes in Computer Science, page 1057-1066. Springer, (2004)A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware., , , and . IEEE Access, (2019)Dynamic Opcode Analysis of Ransomware., , and . Cyber Security, page 1-4. IEEE, (2018)High performance multi-engine regular expression processing., , , and . SoCC, page 347-352. IEEE, (2011)ARAL-CR: An adaptive reasoning and learning cognitive radio platform., , , , , , and . ICSAMOS, page 324-331. IEEE, (2010)Implementation of a network flow lookup circuit for next-generation packet classifiers., and . SoCC, page 208-212. IEEE, (2012)Development of a Run-Time Reconfiguration System with Low Reconfiguration Overhead., , , and . VLSI Signal Processing, 28 (1-2): 97-113 (2001)A New Android Malware Detection Approach Using Bayesian Classification., , , and . CoRR, (2016)Android Malware Detection: an Eigenspace Analysis Approach., , and . CoRR, (2016)