Author of the publication

Real-Time Emulation of Intrusion Victim in HoneyFarm.

, , , , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 143-154. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Workflow-based resource allocation to optimize overall performance of composite services., , , , and . Future Generation Comp. Syst., 25 (3): 199-212 (2009)Performance modeling for real-time content adaptation network., , and . IRI, page 444-447. IEEE Systems, Man, and Cybernetics Society, (2006)An RDF-based annotation framework for providing web resources integrity., , and . IRI, page 99-104. IEEE Systems, Man, and Cybernetics Society, (2006)Empirical study on web content consistency., , and . IRI, page 194-199. IEEE Systems, Man, and Cybernetics Society, (2006)Collaborative Filtering Based Service Ranking Using Invocation Histories., , and . ICWS, page 195-202. IEEE Computer Society, (2011)Adaptive Quality Recommendation Mechanism for Software Service Provisioning., , , and . ICWS, page 169-176. IEEE Computer Society, (2008)Context Query in Information Retrieval., , and . ICTAI, page 101-106. IEEE Computer Society, (2002)Efficient Key Assignment Scheme for Mobile Agent Systems., , and . ICTAI, page 338-345. IEEE Computer Society, (2003)Selection Policy of Rescue Servers Based on Workload Characterization of Flash Crowd., , , and . SKG, page 293-296. IEEE Computer Society, (2010)Content Consistency Model for Pervasive Internet Access., , and . Advances in Web Intelligence and Data Mining, volume 23 of Studies in Computational Intelligence, Springer, (2006)