Author of the publication

Profiling Network Attacks Via AIS.

, and . WIRN/NAIS, volume 3931 of Lecture Notes in Computer Science, page 272-277. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size., and . SECRYPT, page 302-307. SciTePress, (2012)Distributed-interval Type-2 Fuzzy Set based Recognition Algorithm for IDS., and . GrC, page 572-575. IEEE, (2008)Email Granulation Based On Augmented Interval Type-2 Fuzzy Set Methodologies., , and . GrC, page 139-144. IEEE Computer Society, (2007)Concave type-2 fuzzy sets: properties and operations., , , , and . Soft Comput., 14 (7): 749-756 (2010)The Dangers of Rooting: Data Leakage Detection in Android Applications., and . Mobile Information Systems, (2018)What Users Should Know About Full Disk Encryption Based on LUKS., and . CANS, volume 9476 of Lecture Notes in Computer Science, page 225-237. Springer, (2015)Profiling Network Attacks Via AIS., and . WIRN/NAIS, volume 3931 of Lecture Notes in Computer Science, page 272-277. Springer, (2005)Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method., , and . IACR Cryptol. ePrint Arch., (2022)Intrusion Detection via Artificial Immune System: a Performance-based Approach., , and . BICC, volume 268 of IFIP, page 125-135. Springer, (2008)Testing of native artificial immune system for the protection of computer networks.. IADIS AC, page 283-288. IADIS, (2005)