Author of the publication

Detecting and mitigating interest flooding attacks in content-centric network.

, , , , , and . Secur. Commun. Networks, 7 (4): 685-699 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A network-based mobility management scheme for future Internet., , , , and . Comput. Electr. Eng., 36 (2): 291-302 (2010)NLBA: A novel provider mobility support approach in mobile NDN environment., , and . CCNC, page 188-193. IEEE, (2014)Insights for Segment Protection in Survivable WDM Mesh Networks with SRLG Constraints., , and . GLOBECOM, IEEE, (2006)CoLoR: an information-centric internet architecture for innovations., , , , , and . IEEE Netw., 28 (3): 4-10 (2014)A DHT-Based Identifier-to-Locator Mapping Approach for a Scalable Internet., , and . IEEE Trans. Parallel Distributed Syst., 20 (12): 1790-1802 (2009)Insights for segment protection in survivable WDM mesh networks with SRLG constraints., , and . Photonic Netw. Commun., 14 (3): 361-368 (2007)A hybrid protection strategy based on node-disjointness against double failures in optical mesh networks., , , , and . Photonic Netw. Commun., 22 (1): 13-22 (2011)Optimal Cache Timeout for Identifier-to-Locator Mappings with Handovers., , and . IEEE Trans. Network and Service Management, 10 (2): 204-217 (2013)A Gini Impurity-Based Interest Flooding Attack Defence Mechanism in NDN., , and . IEEE Communications Letters, 22 (3): 538-541 (2018)On the applicability of software defined networking to large scale networks., , , , and . ICCCN, page 1-6. IEEE, (2014)