Author of the publication

Modeling repeating behaviors in packet arrivals: Detection and measurement.

, , , , and . INFOCOM, page 2461-2469. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved method for estimating forest canopy height using ICESat-GLAS full waveform data over sloping terrain: A case study in Changbai mountains, China., , , and . Int. J. Applied Earth Observation and Geoinformation, 12 (5): 385-392 (2010)The Application of Intelligent Learning System Based on Network., and . CIS (2), page 107-110. IEEE Computer Society, (2008)978-0-7695-3508-1.Finite-time settling real-time control for multi-robot formation., and . CDC, page 2990-2995. IEEE, (2009)Modeling and motion stability analysis of skid-steered mobile robots., , , , , and . ICRA, page 4112-4117. IEEE, (2009)BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic., , and . NDSS, The Internet Society, (2008)Optimizing Network Performance Using Weighted Multipath Routing., , , and . ICCCN, page 1-7. IEEE, (2012)JumpFlow: Reducing flow table usage in software-defined networks., , , , , , and . Computer Networks, (2015)An Inference Attack Model for Flow Table Capacity and Usage: Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network., , , and . CoRR, (2015)Morphing communications of Cyber-Physical Systems towards moving-target defense., , and . ICC, page 592-598. IEEE, (2014)2.7 µm emissions in Er3+ doped transparent sodium tellurite glass ceramics., , and . ICAIT, page 47-48. IEEE, (2013)