Author of the publication

A hotspot-based probabilistic cache placement policy for ICN in MANETs.

, , , , and . EURASIP J. Wireless Comm. and Networking, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Evaluation Model of CNO Intelligence Information Confidence., , , , and . WISM, volume 5854 of Lecture Notes in Computer Science, page 400-412. Springer, (2009)GHSCN: A Graph Neural Network-Based API Popularity Prediction Method in Service Ecosystem., , , , and . IEEE Access, (2020)HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis., , , , and . IEEE Trans. Netw. Sci. Eng., 8 (4): 3257-3274 (2021)FedHGCDroid: An Adaptive Multi-Dimensional Federated Learning for Privacy-Preserving Android Malware Classification., , , and . Entropy, 24 (7): 919 (2022)A Computer Network Defense Policy Refinement Method., , , , and . ICoC, volume 401 of Communications in Computer and Information Science, page 122-133. Springer, (2013)Design and Implementation of Bus Net Routing Algorithm., , , , and . CIS, page 1474-1478. IEEE Computer Society, (2011)Semantic Similarity Analysis between High-Level Model Description Text and Low-Level Implementation Text for Network Survivability., , , , and . Web Intelligence, page 694-701. IEEE Computer Society, (2012)Static Compliance Checking beyond Separation of Duty Constraints., , , and . 3PGCIC, page 171-178. IEEE Computer Society, (2014)A Tactical Intelligence Production Model of Computer Network Self-Organizing Operations., , , and . ICIC (2), volume 6216 of Lecture Notes in Computer Science, page 400-409. Springer, (2010)SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks., , , , , and . IEEE Trans. Dependable Secur. Comput., 16 (1): 142-155 (2019)