Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modular approach for anomaly based NIDS., and . COMSWARE, page 1-6. IEEE, (2006)Scalability of Correlation Clustering Through Constraint Reduction., , and . CODS, page 1-10. ACM, (2014)Consistent Coordination Decoupling in Tuple Space Based Mobile Middleware: Design and Formal Specifications., , and . ICDCIT, volume 7753 of Lecture Notes in Computer Science, page 220-231. Springer, (2013)Accuracy enhancement of equal segment based approximate adders., , and . IET Comput. Digit. Tech., 12 (5): 206-215 (2018)Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol., , and . SIN, page 111-118. ACM, (2011)An Active Intrusion Detection System for LAN Specific Attacks., , , , , , , and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 129-142. Springer, (2010)Machine Learning Based Approach to Detect Position Falsification Attack in VANETs., , , , and . ISEA-ISAP, volume 939 of Communications in Computer and Information Science, page 166-178. Springer, (2018)Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm., , , and . SocProS (2), volume 131 of Advances in Intelligent and Soft Computing, page 305-315. Springer, (2011)Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity., , , , and . ICDCIT, volume 11319 of Lecture Notes in Computer Science, page 422-439. Springer, (2019)DisTree: A scheme for DHT., and . ICACCI, page 794-799. IEEE, (2013)