Author of the publication

SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet.

, , and . IPOM, volume 5275 of Lecture Notes in Computer Science, page 142-153. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social recommendation using quantified social tie strength., , and . ICACI, page 84-88. IEEE, (2015)Context based Detections against Legal False Price Data and Malicious Disconnect Commands in Smart Grid., , and . ICCSA (6), page 1-9. IEEE, (2018)PR-MAC: Path-Oriented Real-Time MAC Protocol for Wireless Sensor Network., , and . ICESS, volume 4523 of Lecture Notes in Computer Science, page 530-539. Springer, (2007)Multidimensional Trust-Based Anomaly Detection System in Internet of Things., , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 302-313. Springer, (2017)A Novel Dynamic Channel Assembling Strategy in Cognitive Radio Networks With Fine-Grained Flow Classification., , , , and . IEEE Internet Things J., 9 (20): 19599-19614 (2022)A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure., , , and . IEEE Trans. Smart Grid, 6 (5): 2435-2443 (2015)A Self-Powered Hybrid SSHI Circuit with a Wide Operation Range for Piezoelectric Energy Harvesting., , and . Sensors, 21 (2): 615 (2021)Successive direct load altering attack in smart grid., , , and . Comput. Secur., (2018)CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack., , , , , , and . Comput. Secur., (2021)Reputation Mechanism for Inter-domain Routing Security Management., , and . CIT (2), page 98-103. IEEE Computer Society, (2009)978-0-7695-3836-5.