Author of the publication

Attacking Test and Online Forensics in IPv6 Networks.

, , , , and . IMF, volume P-140 of LNI, page 87-106. GI, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Translation from LOTOS and Estelle Specifications to Extended Transition System and its Verification., and . FORTE, page 533-549. North-Holland, (1989)Rotated Hough Filtering for Automatically Distinguishing the Collagen Bundles in the Most Superficial Layer of Articular Cartilage., , and . IEEE J. Biomedical and Health Informatics, 17 (5): 922-927 (2013)MRILDU: An Improvement to ILUT Based on Incomplete LDU Factorization and Dropping in Multiple Rows., and . J. Applied Mathematics, (2014)Attacking Test and Online Forensics in IPv6 Networks., , , , and . IMF, volume P-140 of LNI, page 87-106. GI, (2008)Diagnosing Traffic Anomalies Using a Two-Phase Model., , , and . J. Comput. Sci. Technol., 27 (2): 313-327 (2012)An efficient and accurate method to compute the Fiedler vector based on Householder deflation and inverse power iteration., , and . J. Computational Applied Mathematics, (2014)A Fluidic Biosensor Based on a Phase-Sensitive Low-Coherence Spectral-Domain Interferometer., , , , , , , and . Sensors, 18 (11): 3757 (2018)A Parallelization Technique Based on Factor Combination and Graph Partitioning for General Incomplete LU Factorization., , , and . SIAM J. Scientific Computing, (2012)The Investigation of Cloud-Computing-based Image Mining Mechanism in Mobile Communication WEB on Android., , , , , , , and . GCC, page 408-411. IEEE Computer Society, (2010)