Author of the publication

XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response Deployment.

, , , and . COMPSAC Workshops, page 287-292. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness., , and . CISRC, page 11:1-11:8. ACM, (2016)Data Security for Object-Oriented Programming Systems Based on Inference Engines (Abstract)., and . ACM Conference on Computer Science, page 411. ACM, (1990)Intelligent interfaces for secure multilevel database systems., and . IEA/AIE (2), page 977-981. ACM, (1989)Autonomous agents for coordinated distributed parameterized heuristic routing in large dynamic communication networks., , and . J. Syst. Softw., 56 (3): 231-246 (2001)Automated discovery of concise predictive rules for intrusion detection., , , and . J. Syst. Softw., 60 (3): 165-175 (2002)Detection of Quality Visualization of Appendiceal Orifices Using Local Edge Cross-Section Profile Features and Near Pause Detection., , , , and . IEEE Trans. Biomed. Eng., 57 (3): 685-695 (2010)Polyp-Alert: Near real-time feedback during colonoscopy., , , , and . Comput. Methods Programs Biomed., 120 (3): 164-179 (2015)A Framework for Cost Sensitive Assessment of Intrusion Response Selection., , , and . COMPSAC (1), page 355-360. IEEE Computer Society, (2009)A Reputation-based Trust Management in Peer-to-Peer Network Systems., , , and . PDCS, page 510-515. ISCA, (2004)Leveraging Broadband Access for True On-Demand Delivery of Internet Videos., , and . SAINT, page 171-177. IEEE Computer Society, (2004)