Author of the publication

A study on abnormal event correlation analysis for convergence security monitor.

, , and . Cluster Computing, 16 (2): 219-227 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A polymorphic service management scheme based on virtual object for ubiquitous computing environment., , , and . Multimedia Tools Appl., 74 (16): 6183-6196 (2015)Enabling Lego robots to communicate via infrared routing., and . Telecommunication Systems, 51 (2-3): 125-136 (2012)Belief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes., , , and . Cluster Computing, 19 (1): 309-314 (2016)Improved Structure Management of Gateway Firewall Systems for Effective Networks Security., , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 1076-1083. Springer, (2003)Resource Reservation and Allocation Based on Direction Prediction for Handoff in Mobile Multimedia Networks., , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 555-565. Springer, (2003)Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks., , , and . ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 917-926. Springer, (2006)Flexible authorization in home network environments., , , and . Cluster Computing, 15 (1): 3-15 (2012)Advanced feature point transformation of corner points for mobile object recognition., , , , , and . Multimedia Tools Appl., 74 (16): 6541-6556 (2015)PCA in ERP environment using the misuse detection system design and implementation of RBAC permissions., , and . Multimedia Tools Appl., 73 (2): 601-615 (2014)Detecting for high speed flying object using image processing on target place., , , , and . Cluster Computing, 19 (1): 285-292 (2016)