From post

Topology Map Analysis for Effective Choice of Network Attack Scenario

. International Journal of Computer Networks & Communications (IJCNC), 9 (9): 101-117 (ноября 2017)
DOI: 10.5121/ijcnc.2017.9608

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Optimized Algebraic Method for Higher Order Differential Attack., , и . AAECC, том 2643 из Lecture Notes in Computer Science, стр. 61-70. Springer, (2003)A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs., и . ICICS, том 11149 из Lecture Notes in Computer Science, стр. 708-718. Springer, (2018)Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo., , и . AsiaJCIS, стр. 48-55. IEEE, (2019)Leverage Slow-port-exhaustion Attacks by Exploiting Abnormal Connections from IoT Devices and Docker Containers., , и . J. Inf. Process., (2022)Algebraic Degree Estimation for Integral Attack by Randomized Algorithm., и . WISA, том 10144 из Lecture Notes in Computer Science, стр. 292-304. (2016)Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector., и . ICISS, том 10717 из Lecture Notes in Computer Science, стр. 146-163. Springer, (2017)Study on a scheme for the right to be forgotten., , и . ISITA, стр. 55-59. IEEE, (2014)Anonymous Password-Based Authenticated Key Exchange., , и . INDOCRYPT, том 3797 из Lecture Notes in Computer Science, стр. 244-257. Springer, (2005)Intrusion detection system using Discrete Fourier Transform., , , и . CISDA, стр. 1-5. IEEE, (2014)IMPROVEMENT OF SEARCH ALGORITHM FOR INTEGRAL DISTINGUISHER IN SUBBLOCK-BASED BLOCK CIPHER. International Journal on Cryptography and Information Security (IJCIS), 6 (1/2): 41-62 (2016)