Author of the publication

Attack Sequence Detection in Cloud Using Hidden Markov Model.

, , , and . AsiaJCIS, page 100-103. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient honeypot based malware classification system., and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 925-933. IOS Press, (2014)Adaptive grayscale image coding scheme based on dynamic multi-grouping absolute moment block truncation coding., , , and . Multim. Tools Appl., 79 (37-38): 28189-28205 (2020)Tracing Denial of Service Origin: Ant Colony Approach., , , and . EvoWorkshops, volume 3907 of Lecture Notes in Computer Science, page 286-295. Springer, (2006)Detecting botnet by anomalous traffic., and . J. Inf. Secur. Appl., (2015)Efficient suspicious URL filtering based on reputation., , and . J. Inf. Secur. Appl., (2015)Communication-efficient three-party protocols for authentication and key agreement., , , , and . Comput. Math. Appl., 58 (4): 641-648 (2009)Automatic Summarization of Critical Threat Intelligence Using Transfer Learning., , , , and . ICS, volume 1723 of Communications in Computer and Information Science, page 343-348. Springer, (2022)A Study on Security Trend based on News Analysis., , , , and . iCAST, page 1-4. IEEE, (2019)The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack, an Advanced and Efficient Method., and . AsiaJCIS, page 37-41. IEEE Computer Society, (2015)An Adaptive Data Broadcasting Scheme for Wireless Access., , and . Wireless and Optical Communications, IASTED/ACTA Press, (2006)