Author of the publication

Detecting DDoS attacks against data center with correlation analysis.

, , , and . Computer Communications, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3D Ear Shape Matching Using Joint α-Entropy., , , and . J. Comput. Sci. Technol., 30 (3): 565-577 (2015)Periodic Action Temporal Localization Method Based on Two-Path Architecture for Product Counting in Sewing Video., , , , and . ICIC (3), volume 11645 of Lecture Notes in Computer Science, page 568-580. Springer, (2019)Effects of noise, sampling rate and signal sparsity for compressed sensing Synthetic Aperture Radar pulse compression., , and . IGARSS, page 656-659. IEEE, (2011)Multi-baseline phase unwrapping via maximum likelihood phase gradient estimation., , , , , and . IGARSS, page 374-377. IEEE, (2014)Design of a laser navigation system for substation inspection robot., , , , , , and . ICCA, page 739-743. IEEE, (2013)Finding the anti-block vital edge of a shortest path between two nodes., , and . J. Comb. Optim., 16 (2): 173-181 (2008)Access Authentication Scheme Based on Authorized Certificate in Wireless Mesh Networks., , and . JNW, 9 (1): 231-237 (2014)A Fuzzy Vault Scheme for Ordered Biometrics., , , , and . JCM, 6 (9): 682-690 (2011)Energy-efficiency enhanced virtual machine deployment policy for data-intensive applications in cloud platforms., and . IJIPT, 8 (4): 181-189 (2014)Enabling end-to-end secure communication between wireless sensor networks and the Internet., , , , and . World Wide Web, 16 (4): 515-540 (2013)