Secure Active Node for Security Management
Risk Assessment Method based on Business Process-Oriented Asset Evaluation for Information System Security
Qualitative Method-based The Effective Risk Mitigation Method in The Risk Management (SCIE)
ProFiOt: Abnormal Behavior Profiling (ABP) of IoT devices based on a Machine Learning Approach
Preventing out-of-sequence packets on the route optimization procedure in Proxy Mobile IPv6
Policy Conflict Probing for Integrated Security Management
Policy Based Handoff in MIPv6 Networks (SCIE)
PKG-MIB: Private-mib for Package-based Linux Systems in a Large Scale Management Domain
pFlours_A New Packet and Flow Gathering Tool
Performance Evaluation of Public Key based Mechanisms for Mobile IPv4 Authentication in the AAA Environments (SCIE)
Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks
New Binding Update Method sing GDMHA in Hierarchical Mobile IPv6 (SCIE)
N-dimensional Grid-based Key Predistribution in Wireless Sensor Networks
Moving AAAH Architecture for Mobile IPv6
MonST: Network Mobility Management based on State Table of Mobile Nodes
Modeling Active Cyber Attack for Network Vulnerability Assessment (SCIE)
Mobile IP Using Private IP Address through Stateful Network Address Translation
Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model For Distributed System (SCIE)
Minimal Public-Key Based Authentication Mechanism in Mobile IPv6 Networks
Local Authentication Scheme based on AAA in Mobile IPv6 Networks