Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fault-tolerant QoS Routing mechanism based on PSO and SA., , , and . ICNC, page 255-260. IEEE, (2015)A Lightweight DDoS Flooding Attack Detection Algorithm Based on Synchronous Long Flows., , , , and . GLOBECOM, page 1-6. IEEE, (2015)Characteristics analysis at prefix granularity: A case study in an IPv6 network., , , , , and . J. Network and Computer Applications, (2016)Certificate-aware encrypted traffic classification using Second-Order Markov Chain., , , , and . IWQoS, page 1-10. IEEE, (2016)LAFS: Learning-Based Application-Agnostic Flow Scheduling for Datacenters., , , , , , and . IPCCC, page 1-8. IEEE, (2021)Configuration analysis and recommendation: Case studies in IPv6 networks., , , , , and . Computer Communications, (2014)A New Anomaly Detection Method Based on IGTE and IGFE., , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 93-109. Springer, (2014)Source address filtering for large scale networks., , , , and . Computer Communications, (2014)A WiFi-Direct Based Local Communication System., , , , and . IWQoS, page 1-6. IEEE, (2018)Enabling Software Defined Networking with QoS Guarantee for Cloud Applications., , , , and . CLOUD, page 130-137. IEEE Computer Society, (2017)