Author of the publication

A Distributed Honeynet at KFUPM: A Case Study.

, , and . RAID, volume 6307 of Lecture Notes in Computer Science, page 486-487. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraint-Based Modeling of InterOperability Problems Using an Object-Oriented Approach., and . IAAI, page 87-94. AAAI, (2001)An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic., , , and . CW, page 23-30. IEEE Computer Society, (2011)Inference-Based Constraint Satisfaction Supports Explanation., and . AAAI/IAAI, Vol. 1, page 318-325. AAAI Press / The MIT Press, (1996)Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses., , and . TrustCom, page 1167-1174. IEEE Computer Society, (2012)Identifying Scanning Activities in Honeynet Data Using Data Mining., , , and . CICSyN, page 178-183. IEEE Computer Society, (2011)An Enhanced Estimator to Multi-objective OSPF Weight Setting Problem., , and . NOMS, page 240-247. IEEE, (2006)EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing., , and . UCC, page 49-56. IEEE Computer Society, (2011)Discovering last-matching rules in popular open-source and commercial firewalls., , , , and . Int. J. Internet Protoc. Technol., 5 (1/2): 23-31 (2010)Distributed XML-based network management using JPVM., and . Int. J. Netw. Manag., 16 (4): 263-277 (2006)Towards Simulating a Virtual Distributed Honeynet at KFUPM: A Case Study., , and . EMS, page 316-321. IEEE Computer Society, (2010)