Author of the publication

I-CIFA: An improved collusive interest flooding attack in named data networking.

, , , and . J. Inf. Secur. Appl., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Content-based blind compensation and shaping for streaming video., , , and . CCECE, page 419-422. IEEE, (2009)Towards active detection of identity clone attacks on online social networks., , and . CODASPY, page 27-38. ACM, (2011)RASOP: An API Recommendation Method Based on Word Embedding Technology., , , and . ISICA, volume 1205 of Communications in Computer and Information Science, page 281-295. Springer, (2019)Understanding venue popularity in Foursquare., , and . CollaborateCom, page 409-418. ICST / IEEE, (2013)Taming Single-Thread Program Performance on Many Distributed On-Chip L2 Caches., and . ICPP, page 487-494. IEEE Computer Society, (2008)A Rule-Based System for Localization of Water on the Surface of Mars., , , , and . ITCC, page 662-667. IEEE Computer Society, (2001)Cycling Induced Trap Generation and Recovery Near the Top Select Gate Transistor in 3D NAND., , , , , , , , , and 5 other author(s). IRPS, page 1-5. IEEE, (2019)A Systematic Framework for Malicious Traffic Detection Based on Feature Repository., , , , , and . HCC, volume 11354 of Lecture Notes in Computer Science, page 601-612. Springer, (2018)P2Net: Patch-Match and Plane-Regularization for Unsupervised Indoor Depth Estimation., , and . ECCV (24), volume 12369 of Lecture Notes in Computer Science, page 206-222. Springer, (2020)Wireless Signal Based Elderly Fall Detection Using XGboost Algorithm., , and . SmartIoT, page 304-308. IEEE, (2020)