Author of the publication

Achieving Flow-Level Controllability in Network Intrusion Detection System.

, , , , and . SNPD, page 55-60. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of polarizable ellipsoidal force field model to pnicogen bonds., , , , , and . Journal of Computational Chemistry, 36 (7): 441-448 (2015)Modeling knowledge need awareness using the problematic situations elicited from questions and answers., , and . Knowl.-Based Syst., (2015)The Parallel FDFM Processor Core Approach for CRT-based RSA Decryption., , and . IJNC, 2 (1): 79-96 (2012)Automated wound identification system based on image segmentation and Artificial Neural Networks., and . BIBM, page 1-4. IEEE Computer Society, (2012)Modeling Web Applications and Generating Tests: A Combination and Interactions-guided Approach., and . TASE, page 174-181. IEEE Computer Society, (2009)Analysis of Two Parareal Algorithms for Time-Periodic Problems., , , and . SIAM J. Scientific Computing, (2013)Analysis of a new parareal algorithm based on waveform relaxation method for time-periodic problems., and . Numerical Algorithms, 67 (3): 599-622 (2014)Extracting Database Interactions and Generating Test for Web Applications., , and . Computer and Information Science, volume 208 of Studies in Computational Intelligence, Springer, (2009)An RSA Encryption Hardware Algorithm Using a Single DSP Block and a Single Block RAM on the FPGA., , , and . ICNC, page 140-147. IEEE Computer Society, (2010)A New Formal Modeling Approach for Requirement., , and . CSSE (2), page 267-270. IEEE Computer Society, (2008)978-0-7695-3336-0.