Author of the publication

Quantitative intrusion intensity assessment for intrusion detection systems.

, , , and . Secur. Commun. Networks, 5 (10): 1199-1208 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fuzzy Logic for Autonomous Navigation of Marine Vehicles Satisfy COLREG Guildlines, , and . International Journal of Control, Autonomation, and Systems, 2 (No.2): 171-181 (June 2004)A Cross-layer Cognitive Radio Testbed for the Evaluation of Spectrum Sensing Receiver and Interference Analysis., , , , , , and . CrownCom, page 1-6. IEEE, (2008)CFD study on power output and flow characteristics of 110 kW class BAWT., , , , and . HPCS, page 859-864. IEEE, (2011)Industrial HPC activities in Korea., , , , and . HPCS, page 814-818. IEEE, (2011)Value of virtual monochromatic spectral image of dual-layer spectral detector CT with noise reduction algorithm for image quality improvement in obese simulated body phantom., , , , , , , and . BMC Medical Imaging, 19 (1): 76:1-76:11 (2019)Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification., , and . ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 981-989. Springer, (2006)Network Analysis and Experimental Validation of the Five Shu Points Model of Traditional Oriental Medicine., , , , and . CIT, page 410-415. IEEE Computer Society, (2014)Smart and space-aware interactions using smartphones in a shared space., , , , and . Mobile HCI (Companion), page 53-58. ACM, (2012)Building Lightweight Intrusion Detection System Based on Random Forest., , and . ISNN (2), volume 3973 of Lecture Notes in Computer Science, page 224-230. Springer, (2006)Spam Detection Using Feature Selection and Parameters Optimization., , , and . CISIS, page 883-888. IEEE Computer Society, (2010)