Author of the publication

A Cost-Optimized Detection System Location Scheme for DDoS Attack.

, , , , , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 549-553. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Passive Fingerprinting of SCADA in Critical Infrastructure Network without Deep Packet Inspection., , , and . CoRR, (2016)Obfuscation of Critical Infrastructure Network Traffic Using Fake Communication., , and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 268-274. Springer, (2014)Impact Analysis of PLC Performance When Applying Cyber Security Solutions Using Active Information Gathering., , and . CRITIS, volume 13139 of Lecture Notes in Computer Science, page 133-151. Springer, (2021)Usable Security Management for Network Access Rules of Critical Infrastructure., , , , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 432-447. Springer, (2017)Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network., , , and . WISA, volume 8909 of Lecture Notes in Computer Science, page 358-369. Springer, (2014)Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System., , , and . WISA, volume 8909 of Lecture Notes in Computer Science, page 345-357. Springer, (2014)Security Validation for Data Diode with Reverse Channel., , , and . CRITIS, volume 10242 of Lecture Notes in Computer Science, page 271-282. Springer, (2016)A Cost-Optimized Detection System Location Scheme for DDoS Attack., , , , , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 549-553. Springer, (2004)Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks., , , and . Critical Infrastructure Protection, volume 466 of IFIP Advances in Information and Communication Technology, page 87-102. Springer, (2015)