Author of the publication

Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm.

, , , , , and . Comput. Networks, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning., , , , and . Secur. Commun. Networks, (2021)LNAD: Towards Lightweight Network Anomaly Detection in Software-Defined Networking., , , and . HPCC/DSS/SmartCity, page 855-860. IEEE, (2020)VICTOR: An Adaptive Framing-based Speech Content Authentication and Recovery Algorithm., , , , and . HPCC/DSS/SmartCity/DependSys, page 1649-1654. IEEE, (2022)USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method., , , , , and . J. Netw. Comput. Appl., (October 2023)Human mobility and COVID-19 transmission: a systematic review and future directions., , , , , , , , , and 2 other author(s). Ann. GIS, 28 (4): 501-514 (2022)The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy., , , and . Wirel. Commun. Mob. Comput., (2021)METER: An Ensemble DWT-based Method for Identifying Low-rate DDoS Attack in SDN., , , , , and . EUC, page 79-86. IEEE, (2021)BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence., , , , and . Comput. Networks, (April 2023)A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits., and . ICCCS, page 680-684. IEEE, (2020)Towards Feature Selection for Detecting LDDoS in SD-IoT of Smart Grids: A Multi-correlation Information EA-based Method., , , , , and . ISCAI, page 60-66. ACM, (2023)