Author of the publication

Detecting and Mitigating Target Link-Flooding Attacks Using SDN.

, , , , , and . IEEE Trans. Dependable Sec. Comput., 16 (6): 944-956 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Octa-Log-Polar Fourier Transform for Image Registration., , and . IAS, page 601-604. IEEE Computer Society, (2009)Modeling of a bistable MEMS mechanism with torsion/cantilever beams., , , , and . NEMS, page 153-156. IEEE, (2010)A Method to Recognize Ship Target in SAR Imagery Using an AAM., , and . CSSE (1), page 1025-1027. IEEE Computer Society, (2008)The application of PCA in the basic public service system., , , and . ICMLC, page 630-633. IEEE, (2012)Endpoint learning for multilinear commutator of singular integral on space of homogeneous type., , , , and . ICMLC, page 1319-1325. IEEE, (2012)Computing hypergraph Ramsey numbers by using quantum circuit., , , , and . Quantum Information Processing, 12 (7): 2487-2496 (2013)DCSMS: A Mobicast-Based Dynamic Clustering Secure Mobile Multicast Scheme for Large-Scale Sensornets., , , , and . FCST, page 722-727. IEEE Computer Society, (2009)A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode., , , , and . IIH-MSP, page 64-67. IEEE Computer Society, (2008)Link Stability Based Comprehensive Weighted Strategy for Inter-satellite Link Assignment., , , , and . PAAP, page 149-154. IEEE Computer Society, (2015)Impact of individual response strategy on the spatial public goods game within mobile agents., , , , and . Applied Mathematics and Computation, (2015)