From post

An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification.

, , , , , , и . ICCSA (2), том 3481 из Lecture Notes in Computer Science, стр. 225-234. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Patch Management System for Multi-platform Environment., , , , и . PDCAT, том 3320 из Lecture Notes in Computer Science, стр. 654-661. Springer, (2004)Adaptation Enhanced Mechanism for Web Survivability., , , , и . PDCAT, том 3320 из Lecture Notes in Computer Science, стр. 650-653. Springer, (2004)A novel approach to detection of mobile rogue access points., , , и . Secur. Commun. Networks, 7 (10): 1510-1516 (2014)Safe Patch Distribution Architecture in Intranet Environments., , , , и . Security and Management, стр. 455-460. CSREA Press, (2003)Packet Diversity-Based Anomaly Detection System with OCSVM and Representative Model., , , и . iThings/GreenCom/CPSCom/SmartData, стр. 498-503. IEEE, (2016)Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks., , , , и . NPC, том 3779 из Lecture Notes in Computer Science, стр. 351-354. Springer, (2005)Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms., , , , , и . FSKD, том 4223 из Lecture Notes in Computer Science, стр. 716-724. Springer, (2006)Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning., , , и . ICEA, стр. 47:1-47:5. ACM, (2020)Privacy aware incentive mechanism to collect mobile data while preventing duplication., , , , , и . MILCOM, стр. 1242-1247. IEEE, (2015)Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks., , , , , и . Ad Hoc Sens. Wirel. Networks, 14 (3-4): 251-269 (2012)