Author of the publication

Assessing Survivability of Inter-domain Routing System under Cascading Failures.

, , , and . ICoC, volume 401 of Communications in Computer and Information Science, page 97-108. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 60Gbps DPI Prototype based on Memory-Centric FPGA., , , , and . SIGCOMM, page 627-628. ACM, (2016)CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices., , , and . Softw. Pract. Exp., 47 (3): 421-441 (2017)An efficient distributed key management scheme for group-signature based anonymous authentication in VANET., , , and . Secur. Commun. Networks, 5 (1): 79-86 (2012)Self-Supported Cooperative Networking for Emergency Services in Multi-Hop Wireless Networks., , , and . IEEE J. Sel. Areas Commun., 30 (2): 450-457 (2012)A Multivariate KPIs Anomaly Detection Framework With Dynamic Balancing Loss Training., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (2): 1418-1429 (June 2023)An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications., , , , and . IEEE Trans. Veh. Technol., 59 (7): 3589-3603 (2010)Exploring potential vulnerabilities in data center network., , and . StudentWorkshop@CoNEXT, page 12:1-12:2. ACM, (2010)Enhancing the effectiveness of traffic engineering in hybrid SDN., , and . ICC, page 1-6. IEEE, (2017)Automatic privacy leakage detection for massive android apps via a novel hybrid approach., , , and . ICC, page 1-7. IEEE, (2017)A Structure P2P Based Web Services Registry with Access and Control., , , , and . CD-ARES, volume 8708 of Lecture Notes in Computer Science, page 286-297. Springer, (2014)