Author of the publication

Enhanced Sinkhole System by Improving Post-processing Mechanism.

, , , and . FGIT, volume 6485 of Lecture Notes in Computer Science, page 469-480. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multimedia applications for intelligent fusion computing., , and . Multim. Tools Appl., 74 (10): 3273-3276 (2015)SRS-Tool: A Security Functional Requirement Specification Development Tool for Application Information System of Organization., , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 458-467. Springer, (2005)Enhanced Misuse Case Model: A Security Requirement Analysis and Specification Model., , and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 618-625. Springer, (2006)A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic., , , and . Secur. Commun. Networks, 7 (10): 1612-1621 (2014)A Malware Collection and Analysis Framework Based on Darknet Traffic., , and . ICONIP (2), volume 7664 of Lecture Notes in Computer Science, page 624-631. Springer, (2012)Visualization of Intrusion Detection Alarms Collected from Multiple Networks., , , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 437-454. Springer, (2017)Visualization of security event logs across multiple networks and its application to a CSOC., , , and . Clust. Comput., 22 (Suppl 1): 1861-1872 (2019)Enhanced Sinkhole System by Improving Post-processing Mechanism., , , and . FGIT, volume 6485 of Lecture Notes in Computer Science, page 469-480. Springer, (2010)A Practical Methodology and Framework for Comprehensive Incident Handling Focused on Bot Response., , , and . FGIT, volume 6485 of Lecture Notes in Computer Science, page 481-492. Springer, (2010)A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software., , , and . AsiaJCIS, page 5-9. IEEE Computer Society, (2017)