From post

The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations.

, , , , и . ICCSA (1), том 3043 из Lecture Notes in Computer Science, стр. 191-198. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SVAM: The Scalable Vulnerability Analysis Model Based on Active Networks., , , и . ICOIN, том 3090 из Lecture Notes in Computer Science, стр. 857-866. Springer, (2004)A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments., , , , , и . ICCSA (4), том 3046 из Lecture Notes in Computer Science, стр. 681-688. Springer, (2004)A Survey on Visualization for Wireless Security., , и . NCM (1), стр. 129-132. IEEE Computer Society, (2008)A hierarchical approach to traffic anomaly detection using image processing technique., , и . NCM, стр. 592-594. IEEE Computer Society, (2010)Design of Industrial Firewall System Based on Multiple Access Control Filter., , , , и . FCC, том 301 из Lecture Notes in Electrical Engineering, стр. 535-544. Springer, (2014)The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations., , , , и . ICCSA (1), том 3043 из Lecture Notes in Computer Science, стр. 191-198. Springer, (2004)Preserving Identity Privacy in Wireless Mesh Networks., , , и . ICOIN, стр. 1-5. IEEE, (2008)