Author of the publication

Policy management for network-based intrusion detection and prevention.

, and . NOMS (2), page 219-232. IEEE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies., , and . NOMS (1), page 277-290. IEEE, (2004)Parameterized Local Reduction of Decision Systems., , and . J. Applied Mathematics, (2012)Architectural Support for Global Smart Spaces, , , , , , , , and . CoRR, (2010)First Smart Spaces, , , , , , , , and . CoRR, (2010)Fast algorithms of attribute reduction for covering decision systems with minimal elements in discernibility matrix., , and . Int. J. Machine Learning & Cybernetics, 7 (2): 297-310 (2016)On a New-Member-Joining-Protocol Design Using Bivariate Polynomials Based DKG Algorithms., and . BICS, volume 7888 of Lecture Notes in Computer Science, page 387-394. Springer, (2013)A Context-Aware System for Mobile Data Sharing in Hybrid P2P Environment., , and . ICAS, page 63-68. IEEE Computer Society, (2009)Improved Algorithm and Further Research of β -reduct for variable precision rough set., and . GrC, page 783-786. IEEE Computer Society, (2012)Mobile information retrieval in a hybrid peer-to-peer environment., and . Mobility Conference, ACM, (2009)Novel algorithms of attribute reduction for variable precision rough set., , and . ICMLC, page 108-112. IEEE, (2011)