Author of the publication

A denial-of-service resistant intrusion detection architecture.

, , and . Comput. Networks, 34 (4): 641-658 (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing the Controlled Disclosure of Sensitive Information., , and . ESORICS, volume 1146 of Lecture Notes in Computer Science, page 290-303. Springer, (1996)Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents., , and . J. Netw. Syst. Manag., 12 (1): 95-110 (2004)MOMT: A Multilevel Object Modeling Technique for Designing Secure Database Applications., , and . J. Object Oriented Program., 9 (4): 22-29 (1996)Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information., , and . ESORICS, volume 875 of Lecture Notes in Computer Science, page 431-445. Springer, (1994)Computer Forensics Education., , , , and . IEEE Secur. Priv., 1 (4): 15-23 (2003)Security and Data Mining., , , and . DBSec, volume 51 of IFIP Conference Proceedings, page 391-399. Chapman & Hall, (1995)Inference in MLS Database Systems.. IEEE Trans. Knowl. Data Eng., 8 (1): 46-55 (1996)Enforcing Integrity While Maintaining Secrecy.. DBSec, volume 171 of IFIP Conference Proceedings, page 237-251. Kluwer, (1999)A denial-of-service resistant intrusion detection architecture., , and . Comput. Networks, 34 (4): 641-658 (2000)Selected Topics in Infrastructure and Information Assurance (Panel)., , , and . DBSec, volume 171 of IFIP Conference Proceedings, page 97-113. Kluwer, (1999)