Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Speculating Incident Zone System on Local Area Networks., , and . WTMC@SIGCOMM, page 40-45. ACM, (2018)A Dynamic Navigation System Based on User's Geographical Situation., , and . ER Workshops, volume 1552 of Lecture Notes in Computer Science, page 368-379. Springer, (1998)Unknown Attack Detection by Multistage One-Class SVM Focusing on Communication Interval., , , and . ICONIP (3), volume 8836 of Lecture Notes in Computer Science, page 325-332. Springer, (2014)A Design of a Transparent Backup System Using a Main Memory Database., and . DASFAA, volume 4 of Advanced Database Research and Development Series, page 178-185. World Scientific, (1993)A Quantitative Evaluation of a Wide-Area Distributed System with SDN-FIT., , and . COMPSAC, page 607-612. IEEE, (2020)Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation?, , , , , and . IEEE Internet Things J., 9 (13): 10961-10977 (2022)Web Locality Based Ranking Utilizing Location Names and Link Structure., , , and . WISE Workshops, page 56-63. IEEE Computer Society, (2002)A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System., , , and . DASFAA, volume 4443 of Lecture Notes in Computer Science, page 140-151. Springer, (2007)Malware Classification Method Based on Sequence of Traffic Flow., , , and . ICISSP, page 230-237. SciTePress, (2015)An Adaptive Honeypot System to Capture IPv6 Address Scans., , , , and . CyberSecurity, page 165-172. IEEE Computer Society, (2012)