Results 1 to 4 of 4
Page 1 of 1
Intrusion detection routers: Design, implementation and evaluation using an experimental testbedChan, EYK; Chan, HW; Chan, KM; Chan, PS; Chanson, ST; Cheung, MH; Chong, CF; Chow, KP; Hui, AKT; Hui, LCK; Ip, SK; Lam, CK; Lau, WC; Pun, KH; Tsang, YF; Tsang, WW; Tso, CW; Yeung, DY; Yiu, SM; Yu, KY; Ju, W2006168
IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacksChan, EYK; Chan, HW; Chan, KM; Chan, VPS; Chanson, ST; Cheung, MMH; Chong, CF; Chow, KP; Hui, AKT; Hui, LCK; Lam, LCK; Lau, WC; Pun, KKH; Tsang, AYF; Tsang, WW; Tso, SCW; Yeung, DY; Yu, KY2004107
Bidirectional deformable matching with application to handwritten character extractionCheung, KW; Yeung, DY; Chin, RT2002162
On deformable models for visual pattern recognitionCheung, KW; Yeung, DY; Chin, RT2002151
Page 1 of 1
Export Records
Step 1: Select content and export format
  • Citation only
Step 2: Select export method
  • Download