From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Virtualization in Network Intrusion Detection Systems., , , , , и . OTM Workshops, том 5872 из Lecture Notes in Computer Science, стр. 6-8. Springer, (2009)High Speed NIDS using Dynamic Cluster and Comparator Logic., , , , , и . CIT, стр. 575-581. IEEE Computer Society, (2010)Criteria for Validating Secure Wiping Tools., , и . IFIP Int. Conf. Digital Forensics, том 462 из IFIP Advances in Information and Communication Technology, стр. 321-339. Springer, (2015)Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment., , , , , и . ISDF, том 41 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 26-41. Springer, (2009)On the Approach of Static Feature Extraction in Trojans to Combat against Zero-Day Threats., и . ICITCS, стр. 1-5. IEEE Computer Society, (2014)Event-Based Alert Correlation System to Detect SQLI Activities., , , и . AINA, стр. 175-182. IEEE Computer Society, (2011)MARS: Multi-stage Attack Recognition System., , , , и . AINA, стр. 753-759. IEEE Computer Society, (2010)Implementation and Evaluation of Network Intrusion Detection Systems., , , , , и . Network Performance Engineering, том 5233 из Lecture Notes in Computer Science, Springer, (2011)Empowered Certification Authority in VANETs., , , , и . AINA Workshops, стр. 181-186. IEEE Computer Society, (2009)Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems., , , , , , и . ISDF, том 41 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 57-65. Springer, (2009)