From post

A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents.

, , , и . MATES, том 5774 из Lecture Notes in Computer Science, стр. 91-102. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Takata, Toyoo
add a person with the name Takata, Toyoo
 

Другие публикации лиц с тем же именем

An Effective Distributed Privacy-Preserving Data Mining Algorithm., , , и . IDEAL, том 3177 из Lecture Notes in Computer Science, стр. 320-325. Springer, (2004)Supporting Communication in Time of Disaster., , , , и . BWCCA, стр. 379-384. IEEE, (2012)Confront Phishing Attacks - from a Perspective of Security Education., и . iCAST, стр. 1-4. IEEE, (2019)Enhancing Sensor Network Security by Reducing Radio-Wave Leakage., , , и . BWCCA, стр. 339-344. IEEE Computer Society, (2011)Multistage decoding of multilevel block M-PSK modulation codes and its performance analysis., , , и . IEEE Trans. Inf. Theory, 39 (4): 1204-1218 (1993)The motion capturing of female divers under water and the trial production of motion viewers for developing a virtual diving experience learning system., , , , и . Artif. Life Robotics, 22 (3): 346-356 (2017)A Proposal of Security Advisory System at the Time of the Installation of Applications on Android OS., , , и . NBiS, стр. 261-267. IEEE Computer Society, (2012)A Distributed Approach to Constructing k-Hop Connected Dominating Set in Ad Hoc Networks., , , и . ICPADS, стр. 357-364. IEEE Computer Society, (2013)Suboptimum decoding of decomposable block codes., , , , и . IEEE Trans. Inf. Theory, 40 (5): 1392-1405 (1994)A Defense Method against Distributed Slow HTTP DoS Attack., , , и . NBiS, стр. 152-158. IEEE Computer Society, (2016)