Author of the publication

A Host Based Method for Data Leak Protection by Tracking Sensitive Data Flow.

, , , and . ECBS, page 267-274. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks., , , and . Comput. Sci. Inf. Syst., 15 (1): 139-162 (2018)A Host Based Method for Data Leak Protection by Tracking Sensitive Data Flow., , , and . ECBS, page 267-274. IEEE Computer Society, (2012)On a high-order one-parameter family for the simultaneous determination of polynomial roots., and . Appl. Math. Lett., (2017)Ostrowski-Like Method for the Inclusion of a Single Complex Polynomial Zero., and . Reliab. Comput., (2012)Weierstrass-like Methods with Corrections for the Inclusion of Polynomial Zeros., , and . Computing, 75 (1): 55-69 (2005)Halley-Like Method with Corrections for the Inclusion of Polynomial Zeros.. Computing, 62 (1): 69-88 (1999)An efficient derivative free family of fourth order methods for solving systems of nonlinear equations., , and . Appl. Math. Comput., (2014)Construction of optimal order nonlinear solvers using inverse interpolation., and . Appl. Math. Comput., 217 (6): 2448-2455 (2010)Traub-Gander's family for the simultaneous determination of multiple zeros of polynomials., and . J. Comput. Appl. Math., (2018)On Initial Conditions for the Convergence of Simultaneous Root Finding Methods.. Computing, 57 (2): 163-178 (1996)