Author of the publication

Mitigating Link-Flooding Attack with Segment Rerouting in SDN.

, , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 57-69. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Security Evaluation of XML Communication Protocol., , and . J. Softw., 8 (6): 1428-1435 (2013)Analysis Model of Node Failures and Impact for AANET., , , and . FCS, volume 1286 of Communications in Computer and Information Science, page 55-64. Springer, (2020)Multi-objective Brain Storm Optimization Based on Estimating in Knee Region and Clustering in Objective-Space., , and . ICSI (1), volume 9712 of Lecture Notes in Computer Science, page 479-490. Springer, (2016)Comprehensive Degree Based Key Node Recognition Method in Complex Networks., , , and . ICICS (1), volume 12918 of Lecture Notes in Computer Science, page 348-367. Springer, (2021)A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement., , , , , , and . Inscrypt (1), volume 14526 of Lecture Notes in Computer Science, page 418-432. Springer, (2023)A Modified Multi-Objective Optimization Based on Brain Storm Optimization Algorithm., and . ICSI (2), volume 8795 of Lecture Notes in Computer Science, page 328-339. Springer, (2014)An Adaptive Brain Storm Optimization Algorithm for Multiobjective Optimization Problems., , , , and . ICSI (1), volume 9140 of Lecture Notes in Computer Science, page 365-372. Springer, (2015)Modified Brain Storm Optimization Algorithm for Multimodal Optimization., , and . ICSI (2), volume 8795 of Lecture Notes in Computer Science, page 340-351. Springer, (2014)Using information theory to measure call site information of system call in anomaly detection., and . ICCT, page 6-10. IEEE, (2013)A New Approach to Network Anomaly Attack Detection., , and . FSKD (4), page 317-321. IEEE Computer Society, (2008)978-0-7695-3305-6.