Author of the publication

An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time.

, , , , , , , and . ICISC, volume 4296 of Lecture Notes in Computer Science, page 206-221. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses., , , , , and . Inscrypt, volume 4318 of Lecture Notes in Computer Science, page 279-288. Springer, (2006)Design and Implementation of Risk Analysis system for ISP Network., , and . PACIS, page 8. AISeL, (2004)An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time., , , , , , , and . ICISC, volume 4296 of Lecture Notes in Computer Science, page 206-221. Springer, (2006)