Author of the publication

Design and Implementation of a Gigabit Router using Network Processor.

, , , , and . IMSA, page 32-35. IASTED/ACTA Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QS-Ware: The Middleware for Providing QoS and Secure Ability to Web Server., , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 988-997. Springer, (2004)Design and Implementation of a Gigabit Router using Network Processor., , , , and . IMSA, page 32-35. IASTED/ACTA Press, (2005)LSAD: Lightweight SYN Flooding Attack Detector., , and . ICDCIT, volume 3347 of Lecture Notes in Computer Science, page 385-390. Springer, (2004)FPGA Based Intrusion Detection System Against Unknown and Known Attacks., , , , and . PRIMA, volume 4088 of Lecture Notes in Computer Science, page 801-806. Springer, (2006)Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis., , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 726-727. Springer, (2006)D-SAT: Detecting SYN Flooding Attack by Two-Stage Statistical Approach., , and . SAINT, page 430-436. IEEE Computer Society, (2005)An Optimized Time-constraint Job Distribution Scheme in Group based P2P Networks., , , and . SERA, page 774-781. IEEE Computer Society, (2007)An Efficient Divider Architecture over GF(2m) for Elliptic Curve Cryptography., , and . ESA/VLSI, page 569-576. CSREA Press, (2004)Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets., , , , , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 114-130. Springer, (2008)