Author of the publication

Multi-level Protection Building for Virus Protection Infrastructure.

, , and . International Conference on Computational Science, volume 3036 of Lecture Notes in Computer Science, page 631-634. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Structure Management of Gateway Firewall Systems for Effective Networks Security., , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 1076-1083. Springer, (2003)Resource Reservation and Allocation Based on Direction Prediction for Handoff in Mobile Multimedia Networks., , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 555-565. Springer, (2003)Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks., , , and . ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 917-926. Springer, (2006)Recent trends on mobile computing and future networks., , and . Personal and Ubiquitous Computing, 18 (3): 489-491 (2014)Multi-level Protection Building for Virus Protection Infrastructure., , and . International Conference on Computational Science, volume 3036 of Lecture Notes in Computer Science, page 631-634. Springer, (2004)Location and Direction Estimation-Based Resource Reservation Scheme for the Handoff in Micro Cellular Multimedia Networks., , and . Wireless Personal Communications, 94 (2): 187-208 (2017)HOIDS-Based Detection Method of Vicious Event in Large Networks., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 998-1005. Springer, (2006)Performance Improvement Scheme of NIDS through Optimizing Intrusion Pattern Database., , , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 1098-1105. Springer, (2003)Efficient Migration Algorithm for Mobile Agents in Wired/Wireless Internets., , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 626-636. Springer, (2003)A feature selection approach to find optimal feature subsets for the network intrusion detection system., and . Clust. Comput., 19 (1): 325-333 (2016)