Author of the publication

I-CIFA: An improved collusive interest flooding attack in named data networking.

, , , and . J. Inf. Secur. Appl., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

I-CIFA: An improved collusive interest flooding attack in named data networking., , , and . J. Inf. Secur. Appl., (2021)SEDP-based detection of low-rate DoS attacks., , , and . Int. J. Commun. Syst., 28 (11): 1772-1788 (2015)Correlation-based Detection of LDoS Attack., , , and . J. Softw., 7 (10): 2341-2348 (2012)Access control method for air ticket distribution system based on blockchain., , and . ISPA/BDCloud/SocialCom/SustainCom, page 815-821. IEEE, (2022)A Secure Sharing Framework Based on Cloud-Chain Fusion for SWIM., , and . DataCom, volume 13864 of Lecture Notes in Computer Science, page 127-141. Springer, (2022)Blockchain-Based Trust Model for Air Traffic Management Network., , and . ICCCS, page 92-98. IEEE, (2021)Research on SWIM Cooperative Emergency Response and Resilient Disaster Recovery Based on Survivability., , and . ISADS, page 1-5. IEEE, (2023)A New Transmitter Design for Wireless Power Transmission Systems with Compatible Circular and Solenoidal Receiving Coils., , , , , and . IECON, page 1-6. IEEE, (2023)An adaptive adjustment strategy for bolt posture errors based on an improved reinforcement learning algorithm., , , , , and . Appl. Intell., 51 (6): 3405-3420 (2021)Verified CSAC-Based CP-ABE Access Control of Cloud Storage in SWIM., , , and . EUC, page 72-78. IEEE, (2021)