Author of the publication

DDoS Attack Detection Based on Compensation Non-Parameter CUSUM Algorithm.

, , , and . Security and Management, page 251-257. CSREA Press, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Updatable Storage Access Control System for EHRs in the Cloud., , , , , and . IEEE Trans. Serv. Comput., 16 (4): 2939-2953 (July 2023)Fluent: Round-efficient Secure Aggregation for Private Federated Learning., , , , , and . CoRR, (2024)An Anonymous Conditional Privacy-Preserving Authentication Scheme for VANETs., , and . HPCC/SmartCity/DSS, page 1763-1770. IEEE, (2019)A Message-Oriented Message Dissemination and Authentication Scheme for Vehicular Ad Hoc Networks., , and . ISPA/BDCloud/SocialCom/SustainCom, page 223-228. IEEE, (2019)A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks., , and . CIS, page 625-629. IEEE Computer Society, (2011)IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program., , , , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 336-345. Springer, (2009)ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings., , and . ISECS, page 179-183. IEEE Computer Society, (2008)TBPA: TESLA-based privacy-preserving authentication scheme for vehicular ad hoc networks., , and . Int. J. Embed. Syst., 12 (2): 156-165 (2020)A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model., , , and . IEEE Internet Things J., 11 (6): 10865-10879 (March 2024)Trustworthy Announcement Dissemination Scheme With Blockchain-Assisted Vehicular Cloud., , and . IEEE Trans. Intell. Transp. Syst., 24 (2): 1786-1800 (February 2023)