Author of the publication

Event-Based Alert Correlation System to Detect SQLI Activities.

, , , and . AINA, page 175-182. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Queueing Model for a Wireless GSM/GPRS Cell with Multiple Service Classes., , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 984-995. Springer, (2002)Control of queueing delay in a buffer with time-varying arrival rate., , and . J. Comput. Syst. Sci., 72 (7): 1238-1248 (2006)Approximate Analysis of Arbitrary Open Networks with HOL Priorities and PBS Scheme., and . ESM, page 741-746. SCS Europe, (1998)Approximate Analysis of Arbitrary QNMs with Space and Service Priorities., and . Modelling and Evaluation of ATM Networks, volume 157 of IFIP Conference Proceedings, page 497-521. Kluwer, (1997)Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures., , and . ACM Trans. Manag. Inf. Syst., 12 (2): 11:1-11:29 (2021)Network-centric strategy for mobile transactions., , and . J. Interconnect. Networks, 5 (3): 329-350 (2004)Performance Modelling of Traffic Congestion in Wireless Networks., , and . J. Interconnect. Networks, 7 (1): 163-178 (2006)Virtualization in Network Intrusion Detection Systems., , , , , and . OTM Workshops, volume 5872 of Lecture Notes in Computer Science, page 6-8. Springer, (2009)Efficacy of ADDIE Model in Peer-to-Peer Networks: Digital Evidence Investigation., , and . FiCloud, page 177-183. IEEE, (2021)High Speed NIDS using Dynamic Cluster and Comparator Logic., , , , , and . CIT, page 575-581. IEEE Computer Society, (2010)