Author of the publication

Selectivity and Autoscaling as Complementary Defenses for DDoS Protection to Cloud Services.

, , , , , and . CloudNet, page 1-3. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time link quality estimation for industrial wireless sensor networks using dedicated nodes., , , , and . Ad Hoc Networks, (2017)A Selective Defense for Application Layer DDoS Attacks., , and . JISIC, page 75-82. IEEE, (2014)Cascaded Double Beaulieu-Xie Fading Channels., , , , , and . IEEE Commun. Lett., 24 (10): 2133-2136 (2020)Selectivity and Autoscaling as Complementary Defenses for DDoS Protection to Cloud Services., , , , , and . CloudNet, page 1-3. IEEE, (2019)Evaluation of a Link Quality Estimator in an Outdoor WSN Using a Dedicated Node., , and . ISCC, page 1204-1209. IEEE, (2019)Estimating the blocking probability in wavelength-routed optical networks., and . Opt. Switch. Netw., 10 (4): 430-438 (2013)Distributed approach for channel quality estimation using dedicated nodes in industrial WSN., , , , and . PIMRC, page 1943-1948. IEEE, (2014)Comparison between Channel Hopping and Channel Adaptation for Industrial Wireless Sensor Networks., , , , and . SENSORNETS, page 87-98. SciTePress, (2017)Evaluation of Channels Blacklists in TSCH Networks with Star and Tree Topologies., , , , and . Q2SWinet@MSWiM, page 116-123. ACM, (2018)On the accuracy of formal verification of selective defenses for TDoS attacks., , , and . J. Log. Algebraic Methods Program., (2018)