Author of the publication

SWORDS: Improving Sensor Networks Immunity under Worm Attacks.

, , , and . WAIM, volume 6184 of Lecture Notes in Computer Science, page 86-96. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fused road detection approach in high resolution multi-spectrum remote sensing imagery., , and . IGARSS, page 1557-1560. IEEE, (2005)Analysis of Man-In-The-Middle of Attack on Bitcoin Address., , , and . ICETE (2), page 554-561. SciTePress, (2018)Construction method of concept lattice based on improved variable precision rough set., , and . Neurocomputing, (2016)Towards privacy-preserving RFID-based location-based services., , , , and . FSKD, page 2827-2831. IEEE, (2012)Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?., , , , , , , , and . Peer-to-Peer Computing, page 11-20. IEEE, (2009)Scalable and Decentralized Algorithms for Anomaly Detection via Learning-Based Controlled Sensing., , , , and . IEEE Trans. Signal Inf. Process. over Networks, (2023)Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols., , , , and . J. Comput. Sci. Technol., 25 (2): 375-387 (2010)An effective cost-sensitive sparse online learning framework for imbalanced streaming data classification and its application to online anomaly detection., , , and . Knowl. Inf. Syst., 65 (1): 59-87 (January 2023)The Scale-free Network of Passwords : Visualization and Estimation of Empirical Passwords., , , , and . CoRR, (2015)A GIS Partial Discharge Pattern Recognition Method Based on Improved CBAM-ResNet., , , , , and . J. Electr. Comput. Eng., (2023)