Author of the publication

Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring.

, , , , and . FGIT-FGCN (2), volume 120 of Communications in Computer and Information Science, page 276-283. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eye Tracking Technique for Product Information Provision.. FGIT-SIP/MulGraB, volume 123 of Communications in Computer and Information Science, page 1-7. Springer, (2010)Mobile-Based DoS Attack Security Agent in Sensor Networking., , , and . Wireless Personal Communications, 86 (1): 91-107 (2016)Online Games and Security Issues., , , , and . FGCN (2), page 145-148. IEEE Computer Society, (2008)978-0-7695-3431-2.Web Based Learning Application for LMS.. ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 1164-1169. Springer, (2006)Towards a Service-Oriented Architecture for Interactive Ubiquitous Entertainment Systems., and . ICEC, volume 6243 of Lecture Notes in Computer Science, page 419-421. Springer, (2010)A Study on Application of Cyber Shopping Service with Utilization of Context Awareness in Smart Home Environment., and . ISPA Workshops, volume 4743 of Lecture Notes in Computer Science, page 144-152. Springer, (2007)A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems., , and . ICCSA (2), volume 3981 of Lecture Notes in Computer Science, page 1060-1065. Springer, (2006)Study on Contents Protection in M-Learning Environment., , and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 575-583. Springer, (2006)User Behavior Analysis of the Open-Ended Document Classification System., , , , , and . Australian Conference on Artificial Intelligence, volume 4304 of Lecture Notes in Computer Science, page 1089-1095. Springer, (2006)Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment., , and . Future Generation Comp. Syst., 25 (3): 352-357 (2009)