From post

An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification.

, , , , , , и . ICCSA (2), том 3481 из Lecture Notes in Computer Science, стр. 225-234. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Safe Patch Distribution Architecture in Intranet Environments., , , , и . Security and Management, стр. 455-460. CSREA Press, (2003)Adaptation Enhanced Mechanism for Web Survivability., , , , и . PDCAT, том 3320 из Lecture Notes in Computer Science, стр. 650-653. Springer, (2004)Patch Management System for Multi-platform Environment., , , , и . PDCAT, том 3320 из Lecture Notes in Computer Science, стр. 654-661. Springer, (2004)Towards the advanced security architecture for Microgrid systems and applications.. J. Supercomput., 72 (9): 3535-3548 (2016)A novel approach to detection of mobile rogue access points., , , и . Secur. Commun. Networks, 7 (10): 1510-1516 (2014)Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms., , , , , и . FSKD, том 4223 из Lecture Notes in Computer Science, стр. 716-724. Springer, (2006)Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks., , , , и . NPC, том 3779 из Lecture Notes in Computer Science, стр. 351-354. Springer, (2005)An optimal security management framework for backhaul-aware 5G-Vehicle to Everything (V2X)., , , , и . CoRR, (2019)A Synthetic Time-Series Generation Using a Variational Recurrent Autoencoder with an Attention Mechanism in an Industrial Control System., и . Sensors, 24 (1): 128 (2024)Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning., , , и . ICEA, стр. 47:1-47:5. ACM, (2020)