Author of the publication

Topology Map Analysis for Effective Choice of Network Attack Scenario

. International Journal of Computer Networks & Communications (IJCNC), 9 (9): 101-117 (November 2017)
DOI: 10.5121/ijcnc.2017.9608

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Optimized Algebraic Method for Higher Order Differential Attack., , and . AAECC, volume 2643 of Lecture Notes in Computer Science, page 61-70. Springer, (2003)Algebraic Degree Estimation for Integral Attack by Randomized Algorithm., and . WISA, volume 10144 of Lecture Notes in Computer Science, page 292-304. (2016)Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector., and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 146-163. Springer, (2017)A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs., and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 708-718. Springer, (2018)Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo., , and . AsiaJCIS, page 48-55. IEEE, (2019)Leverage Slow-port-exhaustion Attacks by Exploiting Abnormal Connections from IoT Devices and Docker Containers., , and . J. Inf. Process., (2022)Anonymous Password-Based Authenticated Key Exchange., , and . INDOCRYPT, volume 3797 of Lecture Notes in Computer Science, page 244-257. Springer, (2005)Study on a scheme for the right to be forgotten., , and . ISITA, page 55-59. IEEE, (2014)Strenght of MISTY1 without FL Function for Higher Order Differential Attack., , and . AAECC, volume 1719 of Lecture Notes in Computer Science, page 221-230. Springer, (1999)Intrusion detection system using Discrete Fourier Transform., , , and . CISDA, page 1-5. IEEE, (2014)