Author of the publication

Examination of Defense Method for Tor User Specific Purpose Attacks by Dummy User Attached Communication.

, , , and . AINA Workshops, volume 1150 of Advances in Intelligent Systems and Computing, page 745-755. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Edge Detection and Smoothing-Filter of Volumetric Data., , and . ISVC (2), volume 7432 of Lecture Notes in Computer Science, page 489-498. Springer, (2012)Examination of Defense Method for Tor User Specific Purpose Attacks by Dummy User Attached Communication., , , and . AINA Workshops, volume 1150 of Advances in Intelligent Systems and Computing, page 745-755. Springer, (2020)A practical study on noise-tolerant PN code-based localisation attacks to internet threat monitors., , and . Int. J. Space Based Situated Comput., 3 (4): 215-226 (2013)Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack., , , and . NBiS, page 271-278. IEEE Computer Society, (2014)Continuity Order of Local Displacement in Volumetric Image Sequence., , , , and . WBIR, volume 6204 of Lecture Notes in Computer Science, page 48-59. Springer, (2010)A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents., , , and . MATES, volume 5774 of Lecture Notes in Computer Science, page 91-102. Springer, (2009)A Study on Noise-Tolerant PN Code-Based Localization Attacks to Internet Threat Monitors by Exploiting Multiple Ports., , and . AINA, page 98-105. IEEE Computer Society, (2013)A Study of Packet Sampling Methods for Protecting Sensors Deployed on Darknet., , , , and . NBiS, page 76-83. IEEE Computer Society, (2016)Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a Real Internet Trace., , , and . AINA Workshops, page 341-348. IEEE Computer Society, (2011)