Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An ASIC for SMTP Intrusion Prevention System., , , , and . ISCAS, page 1847-1850. IEEE, (2009)Low Cost Super-Resolution Scaling for Images with Over-Exposed and Saturated Scenes., , , , and . GCCE, page 545-546. IEEE, (2018)A Novel Probabilistic Matching Algorithm for Multi-Stage Attack Forecasts., , , and . IEEE J. Sel. Areas Commun., 29 (7): 1438-1448 (2011)A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN., , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 265-274. Springer, (2008)Novel location privacy protection strategies for Location-Based Services., , and . ICUFN, page 866-870. IEEE, (2015)Statistical learning based consumer electronic devices detection for smart grid., , , and . GCCE, page 1-2. IEEE, (2017)A Restoration Methodology Based on Pre-Planned Source Routing in ATM Networks., , , and . ICC (1), page 277-282. IEEE, (1997)SIPS: A Stateful and Flow-Based Intrusion Prevention System for Email Applications., , , , , and . NPC, volume 4672 of Lecture Notes in Computer Science, page 334-343. Springer, (2007)iPAT: Intelligent privacy-preserving administration tool for IRB applications., , , , , , and . Healthcom, page 494-497. IEEE, (2012)Developing and Implementing IHPM on IXP 425 Network Processor Platforms., , , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 218-231. Springer, (2005)