Author of the publication

Network Traffic Analysis and SCADA Security.

, , , , and . Handbook of Information and Communication Security, Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern Recognition., , and . DASC, page 145-150. IEEE Computer Society, (2011)Host-Based Anomaly Intrusion Detection.. Handbook of Information and Communication Security, Springer, (2010)Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems., and . ICC, page 1179-1184. IEEE, (2007)DSP application in e-commerce security., , , , and . ICASSP, page 1005-1008. IEEE, (2001)Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technology., , , and . AutoID, page 35-40. IEEE, (2007)A survey of network anomaly detection techniques., , and . J. Network and Computer Applications, (2016)An Efficient Privacy-Preserving Ranked Keyword Search Method., , , , , , and . IEEE Trans. Parallel Distrib. Syst., 27 (4): 951-963 (2016)A Cloud Security Assessment System Based on Classifying and Grading., , , and . IEEE Cloud Computing, 2 (2): 58-67 (2015)Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks., , and . NCA, page 210-213. IEEE Computer Society, (2010)Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks., , , , and . TrustCom, page 706-713. IEEE Computer Society, (2012)