Author of the publication

An Automated Signature-Based Approach against Polymorphic Internet Worms.

, and . IEEE Trans. Parallel Distributed Syst., 18 (7): 879-892 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Information Sampling in Multi-Category RFID Systems., , , , , and . IEEE/ACM Trans. Netw., 27 (1): 159-172 (2019)Monitoring Bodily Oscillation With RFID Tags., , , , and . IEEE Internet of Things Journal, 6 (2): 3840-3854 (2019)Estimating the Cardinality of a Mobile Peer-to-Peer Network., , , and . IEEE J. Sel. Areas Commun., 31 (9-Supplement): 359-368 (2013)Analysis of power-aware buffering schemes in wireless sensor networks., , and . ACM Trans. Sens. Networks, 7 (3): 26:1-26:33 (2010)Missing-Tag Detection With Unknown Tags., , , and . IEEE/ACM Trans. Netw., 28 (3): 1297-1310 (2020)Achieving High Scalability Through Hybrid Switching in Software-Defined Networking., , , , and . IEEE/ACM Trans. Netw., 26 (1): 618-632 (2018)On the Performance Regularity of Web Servers., , and . World Wide Web, 7 (3): 241-258 (2004)Stochastic analysis of distributed deadlock scheduling., and . PODC, page 265-273. ACM, (2005)HeavyKeeper: An Accurate Algorithm for Finding Top-k Elephant Flows., , , , , , and . IEEE/ACM Trans. Netw., 27 (5): 1845-1858 (2019)Large-Scale VM Placement with Disk Anti-Colocation Constraints Using Hierarchical Decomposition and Mixed Integer Programming., , , and . IEEE Trans. Parallel Distributed Syst., 28 (5): 1361-1374 (2017)