Author of the publication

Adaptive Architecture for Web Server Survivability.

, , , , and . ADVIS, volume 3261 of Lecture Notes in Computer Science, page 172-180. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Architecture for Web Server Survivability., , , , and . ADVIS, volume 3261 of Lecture Notes in Computer Science, page 172-180. Springer, (2004)An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction., , , , , and . ICOIN, volume 3391 of Lecture Notes in Computer Science, page 72-79. Springer, (2005)An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification., , , , , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 225-234. Springer, (2005)Vulnerability Analysis and Evaluation within an Intranet., , , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 514-515. Springer, (2004)Tree-Based Replica Location Scheme (TRLS) for Data Grids., , , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 819-822. Springer, (2004)A Cost-Optimized Detection System Location Scheme for DDoS Attack., , , , , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 549-553. Springer, (2004)Adaptation Enhanced Mechanism for Web Survivability., , , , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 650-653. Springer, (2004)Patch Management System for Multi-platform Environment., , , , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 654-661. Springer, (2004)Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms., , , , , and . FSKD, volume 4223 of Lecture Notes in Computer Science, page 716-724. Springer, (2006)Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios., , and . AsiaSim, volume 3398 of Lecture Notes in Computer Science, page 643-651. Springer, (2004)