Author of the publication

Information fusion-based method for distributed domain name system cache poisoning attack detection and identification.

, , , and . IET Information Security, 10 (1): 37-44 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tension Measurement System of Oil Based on Embedded System., , and . CSSE (4), page 972-975. IEEE Computer Society, (2008)978-0-7695-3336-0.Video Content Authentication Technique Based on Invariant Feature Detection and Cloud Watermark., , and . ISDA (2), page 602-607. IEEE Computer Society, (2008)Resource availability-aware advance reservation for parallel jobs with deadlines., , , and . The Journal of Supercomputing, 68 (2): 798-819 (2014)Optimized recognition with few instances based on semantic distance., , , and . The Visual Computer, 31 (4): 367-375 (2015)Extending Linden Scripting Language on OpenSim., , and . APSEC, page 488-492. IEEE, (2012)Collaborative Topic Regression with social trust ensemble for recommendation in social media systems., , , , , and . Knowl.-Based Syst., (2016)Towards recommendation to trust-based user groups in social tagging systems., , , and . FSKD, page 893-897. IEEE, (2013)Asymptotic and Non-Asymptotic Analysis of Uplink Sum Rate for Relay-Assisted MIMO Cellular Systems., , , and . IEEE Trans. Signal Processing, 62 (6): 1348-1360 (2014)Community Intrusion Detection and Pre-warning System Based on Wireless Mesh Network., , , and . RAM, page 1066-1070. IEEE, (2008)Research of repeatable positioning accuracy of automatic optical inspection., and . ROBIO, page 2235-2239. IEEE, (2015)