Author of the publication

A Cost-Optimized Detection System Location Scheme for DDoS Attack.

, , , , , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 549-553. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient replication scheme for data grids., , , , , and . ICON, page 392-396. IEEE, (2004)A Cost-Optimized Detection System Location Scheme for DDoS Attack., , , , , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 549-553. Springer, (2004)QoS-Constrained Resource Allocation for a Grid-Based Multiple Source Electrocardiogram Application., , , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 352-359. Springer, (2004)Wide Area Resource Allocation Policy Based on Routing Behaviors for Computational Grids., , , , and . International Conference on Internet Computing, page 598-599. CSREA Press, (2003)Resource Reconfiguration Scheme Based on Temporal Quorum Status Estimation in Computational Grids., , , , , , and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 699-707. Springer, (2004)QoS Quorum-Constrained Resource Management in Wireless Grid., , , , , , and . NPC, volume 3222 of Lecture Notes in Computer Science, page 65-72. Springer, (2004)Tree-Based Replica Location Scheme (TRLS) for Data Grids., , , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 819-822. Springer, (2004)QoS-constraint Configuration Management Policy in Grid over GMPLS Networks., , , , , and . CIT, page 64. IEEE Computer Society, (2006)