Author of the publication

Unexpected Data Dependency Creation and Chaining: A New Attack to SDN.

, , , , , and . SP, page 1512-1526. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and Checking the Security of DIFC System Configurations., and . SafeConfig, page 21-38. Springer, (2012)Evaluating Intrusion-Tolerant Certification Authority Systems., , and . Quality and Reliability Eng. Int., 28 (8): 825-841 (2012)Lost at the Center of a Circle: A Failure Mode and Its Remedy in the Two-Step Weighted Least Squares Method., , , , , and . VTC Spring, page 1-5. IEEE, (2011)Intrusion Confinement by Isolation in Information Systems, , and . Journal of Computer Security, (2000)Scalable-Grain Pipeline Parallelization Method for Multi-core Systems., , , , , and . NPC, volume 8147 of Lecture Notes in Computer Science, page 269-283. Springer, (2013)Rate-Based Watermark Traceback: A New Approach., , and . ISPEC, volume 6047 of Lecture Notes in Computer Science, page 172-186. Springer, (2010)Optimum/Sub-Optimum Detection for Multi-Branch Cooperative Diversity Networks with Limited CSI., and . GLOBECOM, page 1-6. IEEE, (2009)An Improved Cooperative Model for Web Service Based Workflow Management., , , and . CSCWD, page 818-822. IEEE, (2007)Energy Harvesting Noncoherent Cooperative Communications., , , and . IEEE Trans. Wirel. Commun., 14 (12): 6722-6737 (2015)Compressive sensing of multispectral image based on PCA and Bregman split., , and . IGARSS, page 2558-2561. IEEE, (2013)