Author of the publication

A Conceptual Study on the Analytical Process of Information for Crisis Monitoring and Response.

, , , , and . ICHIT (1), volume 7425 of Lecture Notes in Computer Science, page 618-624. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment., , and . KES (3), volume 4253 of Lecture Notes in Computer Science, page 1042-1049. Springer, (2006)Scheme for the Information Sharing Between IDSs Using JXTA., , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 754-761. Springer, (2005)PER Measurement of Vehicular Communication Systems with Adjacent Channel Interferences., , and . ICHIT (2), volume 310 of Communications in Computer and Information Science, page 46-52. Springer, (2012)Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL., , and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 1056-1061. Springer, (2005)A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems., , and . ICCSA (2), volume 3981 of Lecture Notes in Computer Science, page 1060-1065. Springer, (2006)A Vulnerability Assessment Tool Based on OVAL in Linux System., , and . NPC, volume 3222 of Lecture Notes in Computer Science, page 653-660. Springer, (2004)A Design of Safety Multimedia Packet Transmission DB System Management Scheme., , , and . ICHIT (1), volume 7425 of Lecture Notes in Computer Science, page 591-597. Springer, (2012)A Study on the Improvement of Military Logistics System Using RFID., , , , and . ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 1098-1102. Springer, (2006)Study of Optimal Traffic Information Using Agents Techniques., , and . KES-AMSTA, volume 4953 of Lecture Notes in Computer Science, page 868-877. Springer, (2008)Abnormal Traffic Detection System of VoIP Based on SIP., , , and . ICHIT (1), volume 6935 of Lecture Notes in Computer Science, page 496-504. Springer, (2011)