Author of the publication

Identifying Scanning Activities in Honeynet Data Using Data Mining.

, , , and . CICSyN, page 178-183. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Enhanced Estimator to Multi-objective OSPF Weight Setting Problem., , and . NOMS, page 240-247. IEEE, (2006)EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing., , and . UCC, page 49-56. IEEE Computer Society, (2011)An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic., , , and . CW, page 23-30. IEEE Computer Society, (2011)Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses., , and . TrustCom, page 1167-1174. IEEE Computer Society, (2012)Inference-Based Constraint Satisfaction Supports Explanation., and . AAAI/IAAI, Vol. 1, page 318-325. AAAI Press / The MIT Press, (1996)Constraint-Based Modeling of InterOperability Problems Using an Object-Oriented Approach., and . IAAI, page 87-94. AAAI, (2001)Identifying Scanning Activities in Honeynet Data Using Data Mining., , , and . CICSyN, page 178-183. IEEE Computer Society, (2011)Identifying network traffic features suitable for honeynet data analysis., , , and . CCECE, page 1044-1048. IEEE, (2011)Towards Simulating a Virtual Distributed Honeynet at KFUPM: A Case Study., , and . EMS, page 316-321. IEEE Computer Society, (2010)Distributed XML-based network management using JPVM., and . Int. J. Netw. Manag., 16 (4): 263-277 (2006)