Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Realization of Continuously Backed-up RAMs for High-Speed Database Recovery., and . DASFAA, volume 2 of Advanced Database Research and Development Series, page 236-242. World Scientific, (1991)An anti-spam method via real-time retransmission detection., , and . ICON, page 382-388. IEEE, (2012)Message from the Fast Abstract Co-chairs., , , and . COMPSAC (1), page 780. IEEE Computer Society, (2018)Organization of Mobile Networks under Privacy Constraints., , and . ICSC, volume 1749 of Lecture Notes in Computer Science, page 317-322. Springer, (1999)A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts., , , , , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 247-253. Springer, (2007)Caching Schema for Mobile Web information Retrieval., , , and . WebDyn@WWW, volume 702 of CEUR Workshop Proceedings, page 110-117. CEUR-WS.org, (2002)Visual Query Processing for GIS with Web Contents., , and . VDB, volume 216 of IFIP Conference Proceedings, page 171-185. Kluwer, (2002)A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System., , , , and . IEICE Trans. Inf. Syst., 91-D (5): 1282-1291 (2008)A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data., , , , , and . IEICE Trans. Inf. Syst., 93-D (9): 2544-2554 (2010)An Automated ACL Generation System for Secure Internal Network., , , and . COMPSAC Workshops, page 559-564. IEEE Computer Society, (2016)978-1-4673-8845-0.