Author of the publication

Security Technologies and Research Challenges on Microservice-Based NFV.

, , and . J. Softw., 15 (5): 138-146 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatio-temporal reasoning and query of agricultural geographic information based on geo-ontology and SWRL., , , and . Geoinformatics, page 1-6. IEEE, (2010)Chinese coding type identification based on sub-sentence length observation., , , and . NLPKE, page 1-5. IEEE, (2009)Security Technologies and Research Challenges on Microservice-Based NFV., , and . J. Softw., 15 (5): 138-146 (2020)A two-layer traffic clustering framework for network virtualization., , , and . ISCIT, page 262-267. IEEE, (2011)The Change-of-Feature Spatio-temporal Object Relational Model and Its implement., , , and . ESIAT (1), page 194-197. IEEE Computer Society, (2009)Three levels of compression strategies and testings in mobile GIS attribute management., , , and . Communications, Internet, and Information Technology, page 205-209. IASTED/ACTA Press, (2007)Analysis of network node behavior based on MapReduce., , and . CCIS, page 193-197. IEEE, (2014)An Experimental Study on The Unfairness in Adaptive Streaming with HTTP/2 Server Push., , , , , and . VSIP, page 94-98. ACM, (2019)A regular expression grouping algorithm based on partitioning method., , and . IC-NIDC, page 271-274. IEEE, (2012)Research and Design of the Pseudo-VRRP Based High Availability Mechanism in the ForCES Router., and . ICN, page 440-444. IEEE Computer Society, (2009)