Author of the publication

Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT.

, , , and . ComComAP, page 392-395. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Service overlays for Ethernet LAN over SONET/SDH., , , , , and . Opt. Switch. Netw., 7 (2): 54-65 (2010)Evasion Attacks Based on Wasserstein Generative Adversarial Network., , and . ComComAP, page 454-459. IEEE, (2019)Interference Alignment and Its Applications: A Survey, Research Issues, and Challenges., , , , and . IEEE Commun. Surv. Tutorials, 18 (3): 1779-1803 (2016)Estimating the Cardinality of a Mobile Peer-to-Peer Network., , , and . IEEE J. Sel. Areas Commun., 31 (9-Supplement): 359-368 (2013)A Novel Algorithm for Wafer Sojourn Time Analysis of Single-Arm Cluster Tools With Wafer Residency Time Constraints and Activity Time Variation., , , and . IEEE Trans. Syst. Man Cybern. Syst., 45 (5): 805-818 (2015)Agricultural Pest Super-Resolution and Identification With Attention Enhanced Residual and Dense Fusion Generative and Adversarial Network., , , and . IEEE Access, (2020)Multi-Point Ethernet over Next-Generation SONET/SDH., , , , , , and . ICC, page 1-6. IEEE, (2009)Efficient probe selection for fault localization using the property of submodularity., , and . Int. J. Commun. Syst., 26 (1): 84-99 (2013)A multi-scale cucumber disease detection method in natural scenes based on YOLOv5., , , and . Comput. Electron. Agric., (2022)Non-intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network., , and . ACM Trans. Priv. Secur., 27 (1): 12:1-12:32 (2024)