Author of the publication

Topology Map Analysis for Effective Choice of Network Attack Scenario

. International Journal of Computer Networks & Communications (IJCNC), 9 (9): 101-117 (November 2017)
DOI: 10.5121/ijcnc.2017.9608

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs., and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 708-718. Springer, (2018)Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo., , and . AsiaJCIS, page 48-55. IEEE, (2019)Leverage Slow-port-exhaustion Attacks by Exploiting Abnormal Connections from IoT Devices and Docker Containers., , and . J. Inf. Process., (2022)An Optimized Algebraic Method for Higher Order Differential Attack., , and . AAECC, volume 2643 of Lecture Notes in Computer Science, page 61-70. Springer, (2003)Algebraic Degree Estimation for Integral Attack by Randomized Algorithm., and . WISA, volume 10144 of Lecture Notes in Computer Science, page 292-304. (2016)Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector., and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 146-163. Springer, (2017)Study on a scheme for the right to be forgotten., , and . ISITA, page 55-59. IEEE, (2014)Anonymous Password-Based Authenticated Key Exchange., , and . INDOCRYPT, volume 3797 of Lecture Notes in Computer Science, page 244-257. Springer, (2005)An Analysis of TCP ACK Storm DoS Attack on Virtual Network., , and . ISCIT, page 288-293. IEEE, (2019)Intrusion detection system using Discrete Fourier Transform., , , and . CISDA, page 1-5. IEEE, (2014)