Author of the publication

Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment.

, , , , , and . ISDF, volume 41 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 26-41. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficacy of ADDIE Model in Peer-to-Peer Networks: Digital Evidence Investigation., , and . FiCloud, page 177-183. IEEE, (2021)High Speed NIDS using Dynamic Cluster and Comparator Logic., , , , , and . CIT, page 575-581. IEEE Computer Society, (2010)Virtualization in Network Intrusion Detection Systems., , , , , and . OTM Workshops, volume 5872 of Lecture Notes in Computer Science, page 6-8. Springer, (2009)Approximate Analysis of Arbitrary QNMs with Space and Service Priorities., and . Modelling and Evaluation of ATM Networks, volume 157 of IFIP Conference Proceedings, page 497-521. Kluwer, (1997)Approximate Analysis of Arbitrary Open Networks with HOL Priorities and PBS Scheme., and . ESM, page 741-746. SCS Europe, (1998)A Queueing Model for a Wireless GSM/GPRS Cell with Multiple Service Classes., , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 984-995. Springer, (2002)An Efficient Routing Mechanism Based on Heading Angle., , , and . AINA Workshops, page 199-204. IEEE Computer Society, (2009)Performance Analysis of GSM Cells with Re-Use Partitioning., , , and . ESM, page 494-504. SCS Europe, (2002)Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment., , , , , and . ISDF, volume 41 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 26-41. Springer, (2009)Performance evaluation of e-commerce requests in wireless cellular networks., and . Inf. Softw. Technol., 48 (6): 393-401 (2006)