Author of the publication

Erratum to: IT Convergence and Security 2012.

, and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks., , , and . ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 917-926. Springer, (2006)Improved Structure Management of Gateway Firewall Systems for Effective Networks Security., , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 1076-1083. Springer, (2003)Resource Reservation and Allocation Based on Direction Prediction for Handoff in Mobile Multimedia Networks., , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 555-565. Springer, (2003)Location and Direction Estimation-Based Resource Reservation Scheme for the Handoff in Micro Cellular Multimedia Networks., , and . Wireless Personal Communications, 94 (2): 187-208 (2017)Multi-level Protection Building for Virus Protection Infrastructure., , and . International Conference on Computational Science, volume 3036 of Lecture Notes in Computer Science, page 631-634. Springer, (2004)Recent trends on mobile computing and future networks., , and . Personal and Ubiquitous Computing, 18 (3): 489-491 (2014)HOIDS-Based Detection Method of Vicious Event in Large Networks., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 998-1005. Springer, (2006)A feature selection approach to find optimal feature subsets for the network intrusion detection system., and . Clust. Comput., 19 (1): 325-333 (2016)Performance Improvement Scheme of NIDS through Optimizing Intrusion Pattern Database., , , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 1098-1105. Springer, (2003)Efficient Migration Algorithm for Mobile Agents in Wired/Wireless Internets., , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 626-636. Springer, (2003)