Author of the publication

SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability.

, , , , and . PCM (1), volume 3331 of Lecture Notes in Computer Science, page 564-571. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability., , , , and . PCM (1), volume 3331 of Lecture Notes in Computer Science, page 564-571. Springer, (2004)A study of malware detection and classification by comparing extracted strings., , and . ICUIMC, page 75. ACM, (2011)A VoLTE traffic classification method in LTE network., , , , and . APNOMS, page 1-6. IEEE, (2014)A System for Analyzing Advance Bot Behavior., , and . ICISTM, volume 54 of Communications in Computer and Information Science, page 56-63. Springer, (2010)A Study on Context Information Collection for Personal Mobile Device Identification in BYOD and Smart Work Environment., , , and . IoT360 (2), volume 151 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 104-109. Springer, (2014)A high performance VoLTE traffic classification method using HTCondor., , , , and . IM, page 518-524. IEEE, (2015)Context Based Smart Access Control on BYOD Environments., , and . WISA, volume 8909 of Lecture Notes in Computer Science, page 165-176. Springer, (2014)Committing Secure Results with Replicated Servers., , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 246-253. Springer, (2004)Threats and Countermeasures on a 4G Mobile Network., , , , and . IMIS, page 538-541. IEEE Computer Society, (2014)