Author of the publication

Methodology of Network Intrusion Detection System Penetration Testing.

, and . WAIM, page 546-551. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A video steganography algorithm for MVC without distortion drift., , , , and . ICAILP, page 738-742. IEEE, (2014)Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack., , , and . Comput. J., 58 (4): 973-985 (2015)Three-dimensional histogram shifting for reversible data hiding., and . Multim. Syst., 24 (1): 95-109 (2018)Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function., , and . ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 553-562. Springer, (2006)Proposion and Analysis of a TCP Feature of P2P Traffic., , and . PAKDD, volume 4426 of Lecture Notes in Computer Science, page 1148-1155. Springer, (2007)The Proposition and Certification of P2P Media Streaming Traffic Features., , and . ICNC (5), page 281-285. IEEE Computer Society, (2008)Methodology of Network Intrusion Detection System Penetration Testing., and . WAIM, page 546-551. IEEE Computer Society, (2008)A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction., , , and . FSKD (4), page 307-311. IEEE Computer Society, (2007)0-7695-2874-0.P2P Traffic Identification by TCP Flow Analysis., , and . IWNAS, page 47-50. IEEE Computer Society, (2006)A Wav-Audio Steganography Algorithm Based on Amplitude Modifying., and . CIS, page 489-493. IEEE Computer Society, (2014)