Author of the publication

High Performance DDoS Attack Detection System Based on Distribution Statistics.

, , , , , , and . NPC, volume 11783 of Lecture Notes in Computer Science, page 132-142. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Path Finding With Beetle Antennae Search Algorithm by Using Ant Colony Optimization Initialization and Different Searching Strategies., , , , , and . IEEE Access, (2020)Transformer-Based Maneuvering Target Tracking., , , , and . Sensors, 22 (21): 8482 (2022)AutoCVSS: An Approach for Automatic Assessment of Vulnerability Severity Based on Attack Process., , , , and . GPC, volume 11484 of Lecture Notes in Computer Science, page 238-253. Springer, (2019)A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS., , , and . IEEE NAS, page 265-266. IEEE Computer Society, (2007)Ensemble Learning-Based Wind Turbine Fault Prediction Method with Adaptive Feature Selection., , , , and . ICPCSEE (2), volume 728 of Communications in Computer and Information Science, page 572-582. Springer, (2017)Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes., , , , , , , , and . NDSS, The Internet Society, (2023)A new robust data hiding method for H.264/AVC without intra-frame distortion drift., , , and . Neurocomputing, (2015)A Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-Frame Distortion Drift., , , and . IEEE Trans. Circuits Syst. Video Techn., 20 (10): 1320-1330 (2010)An Improved SVM Based Wind Turbine Multi-fault Detection Method., , , , and . ICPCSEE (1), volume 727 of Communications in Computer and Information Science, page 27-38. Springer, (2017)PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound., , , , , , and . CoRR, (2024)