Author of the publication

Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks.

, and . DSN Workshops, page 99-100. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DELTA: A Security Assessment Framework for Software-Defined Networks., , , , , and . NDSS, The Internet Society, (2017)Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy., , and . RAID, page 250-263. ACM, (2023)Formullar: An FPGA-based network testing tool for flexible and precise measurement of ultra-low latency networking systems., , , and . Comput. Networks, (2021)FuzzDocs: An Automated Security Evaluation Framework for IoT., , , , , , and . IEEE Access, (2022)Just-in-time WLANs: On-demand interference-managed WLAN infrastructures., , , , , and . INFOCOM, page 1-9. IEEE, (2016)Understanding Block and Transaction Logs of Permissionless Blockchain Networks., and . Secur. Commun. Networks, (2021)Duo: Software Defined Intrusion Tolerant System Using Dual Cluster., , , , , and . Secur. Commun. Networks, (2018)Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method., , , , , and . IEICE Trans. Inf. Syst., 105-D (4): 824-827 (2022)Toward Semantic Assessment of Vulnerability Severity: A Text Mining Approach., and . CIKM Workshops, volume 2482 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Network Virtualization System for Smart Grid Data Acquisition System., , and . ICACT, page 295-298. IEEE, (2019)