Author of the publication

Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.

, , , and . SEC, volume 193 of IFIP Conference Proceedings, page 369-384. Kluwer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies., , and . NOMS (1), page 277-290. IEEE, (2004)iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks., , , and . INFOCOM, page 968-976. IEEE, (2008)Measuring Message Propagation and Social Influence on Twitter.com., and . SocInfo, volume 6430 of Lecture Notes in Computer Science, page 216-231. Springer, (2010)Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups., , , , , , and . CoRR, (2018)More or Less? Predict the Social Influence of Malicious URLs on Social Media., , , , , , , and . CoRR, (2018)Intrusion detection for link state routing protocol through integrated network management., , , and . ICCCN, page 634-639. IEEE, (1999)A property oriented fault detection approach for link state routing protocol., , and . ICCCN, page 114-119. IEEE, (2000)The implementation of data storage and analytics platform for big data lake of electricity usage with spark., , , and . J. Supercomput., 77 (6): 5934-5959 (2021)A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network., , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 96-107. Springer, (2005)MELDing transactions and objects., , and . OOPSLA/ECOOP Workshop on Object-based Concurrent Programming, page 94-98. ACM, (1990)