Author of the publication

Superpoint-based detection against distributed denial of service (DDoS) flooding attacks.

, , , and . LANMAN, page 1-6. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure virtual network embedding to mitigate the risk of covert channel attacks., , , , and . INFOCOM Workshops, page 144-145. IEEE, (2016)Achieving Fair Service with a Layered Scheduling Scheme for CICQ Switches., , , and . ICDMA, page 137-142. IEEE Computer Society, (2011)A Fair Service and Dynamic Round Robin scheduling scheme for CICQ switches., , , and . ICT, page 1-6. IEEE, (2008)Achieving fair service with a hybrid scheduling scheme for CICQ switches., , , and . SCIENCE CHINA Information Sciences, 55 (3): 689-700 (2012)CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks., , , and . TIIS, 12 (12): 6098-6122 (2018)Towards Adaptive Network Nodes via Service Chain Construction., , , , , and . IEEE Trans. Network and Service Management, 12 (2): 248-262 (2015)Superpoint-based detection against distributed denial of service (DDoS) flooding attacks., , , and . LANMAN, page 1-6. IEEE, (2015)Achieve load balancing with a dynamic re-routing CICQ switching scheme., , , and . SCIENCE CHINA Information Sciences, 55 (2): 407-418 (2012)How to Make Network Nodes Adaptive?, , , , and . IEEE Communications Letters, 18 (3): 515-518 (2014)Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensional network properties., , and . Frontiers of IT & EE, 20 (2): 238-252 (2019)