Author of the publication

Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition.

, , , , and . ICC, page 1670-1674. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neighbors-buffering-based video-on-demand architecture., , and . Signal Process. Image Commun., 18 (7): 515-526 (2003)Divide and Conquer Technique for Network Fault Management., , , , , and . Integrated Network Management, volume 86 of IFIP Conference Proceedings, page 675-687. Chapman & Hall, (1997)Network Controlled Handover for Improving TCP Performance in LEO Satellite Networks., , , , and . GLOBECOM, IEEE, (2006)Network Management In A Large-scale OSI-based Campus Network., , , , , , and . NOMS, page 566-577. (1992)Network Application Identification Using Transition Pattern of Payload Length., , , , , and . WCNC, page 2633-2638. IEEE, (2008)A new smooth handoff scheme for mobile multimedia streaming using RTP dummy packets and RTCP explicit handoff notification., , , , and . WCNC, page 2162-2167. IEEE, (2006)Distributed Early Worm Detection Based on Payload Histograms., , , , and . ICC, page 1404-1408. IEEE, (2007)Combating Against Attacks on Encrypted Protocols., , , , , , and . ICC, page 1211-1216. IEEE, (2007)Dynamic QoS Negotiation for Next-Generation Wireless Communications Systems., , , , , and . WCNC, page 3227-3231. IEEE, (2007)On Gateway Selection Protocol for DYMO-Based MANET., , , , and . WiMob, page 32-37. IEEE Computer Society, (2008)