From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adaptive Architecture for Web Server Survivability., , , , и . ADVIS, том 3261 из Lecture Notes in Computer Science, стр. 172-180. Springer, (2004)Vulnerability Analysis and Evaluation within an Intranet., , , и . ISI, том 3073 из Lecture Notes in Computer Science, стр. 514-515. Springer, (2004)Tree-Based Replica Location Scheme (TRLS) for Data Grids., , , , и . GCC, том 3251 из Lecture Notes in Computer Science, стр. 819-822. Springer, (2004)An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification., , , , , , и . ICCSA (2), том 3481 из Lecture Notes in Computer Science, стр. 225-234. Springer, (2005)An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction., , , , , и . ICOIN, том 3391 из Lecture Notes in Computer Science, стр. 72-79. Springer, (2005)A Cost-Optimized Detection System Location Scheme for DDoS Attack., , , , , и . PDCAT, том 3320 из Lecture Notes in Computer Science, стр. 549-553. Springer, (2004)Adaptation Enhanced Mechanism for Web Survivability., , , , и . PDCAT, том 3320 из Lecture Notes in Computer Science, стр. 650-653. Springer, (2004)Patch Management System for Multi-platform Environment., , , , и . PDCAT, том 3320 из Lecture Notes in Computer Science, стр. 654-661. Springer, (2004)Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms., , , , , и . FSKD, том 4223 из Lecture Notes in Computer Science, стр. 716-724. Springer, (2006)Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios., , и . AsiaSim, том 3398 из Lecture Notes in Computer Science, стр. 643-651. Springer, (2004)