Author of the publication

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks.

, , and . IEEE Trans. Parallel Distrib. Syst., 18 (5): 577-588 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An overview of anomaly detection techniques: Existing solutions and latest technological trends., and . Computer Networks, 51 (12): 3448-3470 (2007)A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks., and . I. J. Network Security, 2 (2): 131-137 (2006)Defense against Primary User Emulation Attacks in Cognitive Radio Networks., , and . IEEE Journal on Selected Areas in Communications, 26 (1): 25-37 (2008)Security and Enforcement in Spectrum Sharing., , , , , and . Proceedings of the IEEE, 102 (3): 270-281 (2014)Spectrum Access Technologies: The Past, the Present, and the Future., , and . Proceedings of the IEEE, 100 (Centennial-Issue): 1676-1684 (2012)Robust Distributed Spectrum Sensing in Cognitive Radio Networks., , and . INFOCOM, page 1876-1884. IEEE, (2008)An Adaptive Sampling Algorithm with Applications to Denial-of-Service Attack Detection., and . ICCCN, page 11-16. IEEE, (2006)A novel supervised feature extraction for decoding sEMG signals robust to the sensor positions., and . URAI, page 39-42. IEEE, (2014)A Real-time Motion Data Reduction and Restoration Compatible with Robot's Physical Limits., , and . ICINCO (2), page 360-367. SciTePress, (2014)Efficient Multicast Packet Authentication Using Signature Amortization., , and . IEEE Symposium on Security and Privacy, page 227-240. IEEE Computer Society, (2002)