Author of the publication

Honeynet in network security using multi-layer data control and data capture mechanisms.

, , and . Communications and Computer Networks, page 114-119. IASTED/ACTA Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wireless Communication Technologies for Vehicular Nodes: A Survey., and . IJMCMC, 5 (2): 58-77 (2013)A gene-regulated nested neural network., , , and . Int. Arab J. Inf. Technol., 12 (6): 532-539 (2015)Developing Software Signature Search Engines Using Paragraph Vector Model: A Triage Approach for Digital Forensics., , and . IEEE Access, (2021)A Hybrid Rule Based Fuzzy-Neural Expert System For Passive Network Monitoring, , , , and . CoRR, (2013)Fuzzy Based Diagnostics System for Identifying Network Traffic Flow Anomalies, , , , and . CoRR, (2013)Adaptive Real-Time Network Monitoring System: Detecting Anomalous Activity with Evolving Connectionist System., , , and . ICETE (Selected Papers), volume 3 of Communications in Computer and Information Science, page 113-125. (2005)An Enhanced Quality of Service-Based Trust Model for Cloud Computing., and . ICMC, volume 1412 of Advances in Intelligent Systems and Computing, page 525-538. Springer, (2021)Machine Loading Optimization in Flexible Manufacturing System Using a Hybrid of Bio-inspired and Musical-Composition Approach., , , and . BIC-TA, page 89-96. IEEE Computer Society, (2011)Provisioning virtual IPTV delivery networks using hybrid genetic algorithm., , and . ICUIMC, page 106:1-106:6. ACM, (2014)Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method., , , , , , and . Int. J. Commun. Networks Inf. Secur., (2019)