Author of the publication

Virtualization in Network Intrusion Detection Systems.

, , , , , and . OTM Workshops, volume 5872 of Lecture Notes in Computer Science, page 6-8. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtualization in Network Intrusion Detection Systems., , , , , and . OTM Workshops, volume 5872 of Lecture Notes in Computer Science, page 6-8. Springer, (2009)High Speed NIDS using Dynamic Cluster and Comparator Logic., , , , , and . CIT, page 575-581. IEEE Computer Society, (2010)Criteria for Validating Secure Wiping Tools., , and . IFIP Int. Conf. Digital Forensics, volume 462 of IFIP Advances in Information and Communication Technology, page 321-339. Springer, (2015)Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment., , , , , and . ISDF, volume 41 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 26-41. Springer, (2009)On the Approach of Static Feature Extraction in Trojans to Combat against Zero-Day Threats., and . ICITCS, page 1-5. IEEE Computer Society, (2014)Event-Based Alert Correlation System to Detect SQLI Activities., , , and . AINA, page 175-182. IEEE Computer Society, (2011)MARS: Multi-stage Attack Recognition System., , , , and . AINA, page 753-759. IEEE Computer Society, (2010)Implementation and Evaluation of Network Intrusion Detection Systems., , , , , and . Network Performance Engineering, volume 5233 of Lecture Notes in Computer Science, Springer, (2011)Empowered Certification Authority in VANETs., , , , and . AINA Workshops, page 181-186. IEEE Computer Society, (2009)Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems., , , , , , and . ISDF, volume 41 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 57-65. Springer, (2009)