From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework., , и . Security and Management, стр. 397-401. CSREA Press, (2003)A Study on Security Middleware Framework for the Ubiquitous Platform., , , и . VTC Fall, стр. 1-5. IEEE, (2006)Policy-Based Intrusion Detection and Automated Response Mechanism., , и . ICOIN (2), том 2344 из Lecture Notes in Computer Science, стр. 399-408. Springer, (2002)Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks., , , , и . WISA, том 4298 из Lecture Notes in Computer Science, стр. 282-296. Springer, (2006)Function Call Mechanism Based Executable Code Detection for the Network Security., , , , и . SAINT, стр. 62-67. IEEE Computer Society, (2008)Tracing Stored Program Counter to Detect Polymorphic Shellcode., , , и . IEICE Trans. Inf. Syst., 91-D (8): 2192-2195 (2008)Memory-efficient content filtering hardware for high-speed intrusion detection systems., , , , , и . SAC, стр. 264-269. ACM, (2007)A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks., , , , и . ICOIN (1), том 2343 из Lecture Notes in Computer Science, стр. 17-27. Springer, (2002)Role-based policy distribution techniques in policy-based networks., , , и . Communications, Internet, and Information Technology, стр. 103-107. IASTED/ACTA Press, (2004)Defense Against TCP Flooding Attack., , , и . SECRYPT, стр. 416-420. SciTePress, (2012)