Author of the publication

A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents.

, , , and . MATES, volume 5774 of Lecture Notes in Computer Science, page 91-102. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of a Defence Method against Slow HTTP DoS Attack., , , and . ISITA, page 316-320. IEEE, (2018)A Defense Method against Distributed Slow HTTP DoS Attack., , , and . NBiS, page 152-158. IEEE Computer Society, (2016)A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System., , , and . AINA, page 438-445. IEEE Computer Society, (2010)Development of Security Scanner with High Portability and Usability., , and . AINA, page 407-410. IEEE Computer Society, (2005)Development of Security Scanner with High Usability., , and . AINA (1), page 139-144. IEEE Computer Society, (2004)An Efficient RP (Rendezvous Point) Replacement Mechanism for Rendezvous-Based Multicast Routing., , and . ICDCS Workshops, page 514-518. IEEE Computer Society, (2003)EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks., and . J. Commun., 12 (6): 304-311 (2017)A Robust Energy Efficient Epidemic Routing Protocol for Delay Tolerant Networks., and . DSDIS, page 290-296. IEEE Computer Society, (2015)On the Performance Enhancement of Vehicular Ad Hoc Network for Transportation Cyber Physical Systems., and . WCNC Workshops, page 1-6. IEEE, (2017)Composition method of communication system specifications in asynchronous model and its support system., , , , , , , and . ICON, page 64-69. IEEE, (2001)