Author of the publication

Enhance IPv6 Dynamic Host Configuration with Cryptographically Generated Addresses.

, , , and . IMIS, page 487-490. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

In-Field Attack Proof of Injected False Data in Sensor Networks., , , and . JCM, 3 (6): 35-42 (2008)A Taxonomy of Hyperlink Hiding Techniques, , , , and . CoRR, (2013)Phishing detection based on newly registered domains., , , , and . BigData, page 3685-3692. IEEE Computer Society, (2016)Detecting DDoS Attack towards DNS Server Using a Neural Network Classifier., , , and . ICANN (3), volume 6354 of Lecture Notes in Computer Science, page 118-123. Springer, (2010)A New Statistical Approach to DNS Traffic Anomaly Detection., , , and . ADMA (2), volume 6441 of Lecture Notes in Computer Science, page 302-313. Springer, (2010)RPKI Deployment: Risks and Alternative Solutions., , , , , and . ICGEC (1), volume 387 of Advances in Intelligent Systems and Computing, page 299-310. Springer, (2015)Modeling DNS Activities Based on Probabilistic Latent Semantic Analysis., , , and . ADMA (2), volume 6441 of Lecture Notes in Computer Science, page 290-301. Springer, (2010)Scaling the number of DNS root servers with Internet., , and . GLOBECOM Workshops, page 248-253. IEEE, (2014)Efficient Complex Event Processing over RFID Data Stream., , , and . ACIS-ICIS, page 75-81. IEEE Computer Society, (2008)Dynamic proxy based distributed mobility management in PURSUIT., , , and . GLOBECOM Workshops, page 1024-1028. IEEE, (2013)