Author of the publication

Thinking inside the Box: Differential Fault Localization for SDN Control Plane.

, , , , , and . IM, page 353-359. IFIP, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detect and identify blocker tags in tree-based RFID systems., , , and . ICC, page 2133-2137. IEEE, (2013)Efficient pinpointing of misplaced tags in large RFID systems., , , and . SECON, page 287-295. IEEE, (2011)A Range-Free Localization of Passive RFID Tags Using Mobile Readers., , , , and . MASS, page 445-446. IEEE Computer Society, (2015)Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach., , , and . IEEE/ACM Trans. Netw., 22 (2): 608-621 (2014)FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking., , , , , and . INFOCOM, page 396-404. IEEE, (2018)LOCK: A fast and flexible tag scanning mechanism with handheld readers., , , and . IWQoS, page 360-369. IEEE, (2014)Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems., , , and . Concurrency and Computation: Practice and Experience, 25 (14): 2080-2097 (2013)A new differential RAID for high reliable All Flash Array., , , and . IEICE Electronic Express, 11 (23): 20141007 (2014)A Method Based on AMHI for DDoS Attacks Detection and Defense., and . ICYCS, page 1571-1576. IEEE Computer Society, (2008)Robust localization against outliers in wireless sensor networks., , , and . TOSN, 9 (2): 24:1-24:26 (2013)