Author of the publication

Design of a Snort-Based Hybrid Intrusion Detection System.

, , , , and . IWANN (2), volume 5518 of Lecture Notes in Computer Science, page 515-522. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solving Eigenvalue Problems on Networks of Processors., , , , and . VECPAR, volume 1573 of Lecture Notes in Computer Science, page 85-99. Springer, (1998)Design of a Snort-Based Hybrid Intrusion Detection System., , , , and . IWANN (2), volume 5518 of Lecture Notes in Computer Science, page 515-522. Springer, (2009)Accounting the control effort to improve chaos suppression via robust adaptive feedback., , , and . IJMIC, 6 (2): 147-155 (2009)Capturing patients' daily life experiences after Total Hip Replacement., , and . PervasiveHealth, page 226-229. IEEE, (2011)Design of modular field programmable analog array hardware for analysis of large power systems., , , , and . ISCAS, page 1207-1210. IEEE, (2012)Linear estimation of continuous-discrete linear state space models with multiplicative noise., and . Systems & Control Letters, 47 (2): 91-101 (2002)Analysis of Reconfigurable Tap Changing Transformer Model through Analog Emulation., and . ISCAS, page 1989-1992. IEEE, (2009)How Many Quantum Correlations Are Not Local?., , , and . TQC, volume 44 of LIPIcs, page 39-47. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2015)Hardware prototype to emulate the dynamics of power system generators with field programmable analog arrays., , , and . ISCAS, page 2314-2317. IEEE, (2010)Nonlinear EEG analysis based on a neural mass model., , , , and . Biological Cybernetics, 81 (5-6): 415-424 (1999)