Author of the publication

A Security Threats Taxonomy for Routing System Intrusion Detection.

, , , and . CIS, page 267-270. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PPQC: A Blockchain-Based Privacy-Preserving Quality Control Mechanism in Crowdsensing Applications., , , , , and . IEEE/ACM Trans. Netw., 30 (3): 1352-1367 (2022)TIPCB: A simple but effective part-based convolutional baseline for text-based person search., , , , and . Neurocomputing, (2022)Narrow optical filtering tolerance of 127-Gb/s DP-QPSK utilizing real-time DSP with 20 cascaded 50-GHz filters in the presence of 40, 200-ps/nm chromatic dispersion., , , , and . OFC/NFOEC, page 1-3. IEEE, (2013)An Epidemic-Dynamics-Based Model for CXPST Spreading in Inter-Domain Routing System., , and . BIC-TA, volume 212 of Advances in Intelligent Systems and Computing, page 485-493. Springer, (2013)A Security Threats Taxonomy for Routing System Intrusion Detection., , , and . CIS, page 267-270. IEEE Computer Society, (2016)Address Knocking: An Undetectable Authentication Based on IPv6 Address., , and . PDCAT, page 85-89. IEEE, (2012)Survey on network flow watermarking: model, interferences, applications, technologies and security., , , , and . IET Commun., 12 (14): 1639-1648 (2018)Delay Normalization Interference Resistance Packet Order Based Flow Watermarking Technology., , , , and . ISCID (2), page 383-386. IEEE, (2017)A Heuristic Partial-Correlation-Based Algorithm for Causal Relationship Discovery on Continuous Data., and . IDEAL, volume 5788 of Lecture Notes in Computer Science, page 234-241. Springer, (2009)TIPCB: A Simple but Effective Part-based Convolutional Baseline for Text-based Person Search., , , , , and . CoRR, (2021)