Author of the publication

Virtualization in Network Intrusion Detection Systems.

, , , , , and . OTM Workshops, volume 5872 of Lecture Notes in Computer Science, page 6-8. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network-centric strategy for mobile transactions., , and . J. Interconnect. Networks, 5 (3): 329-350 (2004)Performance Modelling of Traffic Congestion in Wireless Networks., , and . J. Interconnect. Networks, 7 (1): 163-178 (2006)Approximate Analysis of Arbitrary QNMs with Space and Service Priorities., and . Modelling and Evaluation of ATM Networks, volume 157 of IFIP Conference Proceedings, page 497-521. Kluwer, (1997)Approximate Analysis of Arbitrary Open Networks with HOL Priorities and PBS Scheme., and . ESM, page 741-746. SCS Europe, (1998)Control of queueing delay in a buffer with time-varying arrival rate., , and . J. Comput. Syst. Sci., 72 (7): 1238-1248 (2006)A Queueing Model for a Wireless GSM/GPRS Cell with Multiple Service Classes., , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 984-995. Springer, (2002)Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures., , and . ACM Trans. Manag. Inf. Syst., 12 (2): 11:1-11:29 (2021)Efficacy of ADDIE Model in Peer-to-Peer Networks: Digital Evidence Investigation., , and . FiCloud, page 177-183. IEEE, (2021)Virtualization in Network Intrusion Detection Systems., , , , , and . OTM Workshops, volume 5872 of Lecture Notes in Computer Science, page 6-8. Springer, (2009)An Efficient Routing Mechanism Based on Heading Angle., , , and . AINA Workshops, page 199-204. IEEE Computer Society, (2009)