Author of the publication

Suspicious Flow Forwarding for Multiple Intrusion Detection Systems on Software-Defined Networks.

, , , , and . IEEE Netw., 30 (6): 22-27 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a CDN over ICN., , , and . DCNET/ICE-B/OPTICS, page 46-51. SciTePress, (2012)Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense., , , , , , , , and . IEEE Commun. Surv. Tutorials, 22 (1): 709-745 (2020)Multilingual Sentence-Level Semantic Search using Meta-Distillation Learning., , , , and . CoRR, (2023)Seamless Virtualized Controller Migration for Drone Applications., , , , and . IEEE Internet Comput., 23 (2): 51-58 (2019)KPQA: A Metric for Generative Question Answering Using Keyphrase Weights., , , , , , and . NAACL-HLT, page 2105-2115. Association for Computational Linguistics, (2021)Deep Reinforcement Learning-based Building Energy Management using Electric Vehicles for Demand Response., , and . ICAIIC, page 375-377. IEEE, (2023)A Gradually Soft Multi-Task and Data-Augmented Approach to Medical Question Understanding., , , , , , and . ACL/IJCNLP (1), page 1505-1515. Association for Computational Linguistics, (2021)Medical Question Understanding and Answering with Knowledge Grounding and Semantic Self-Supervision., , , , , , , and . COLING, page 2734-2747. International Committee on Computational Linguistics, (2022)Development of AI-based Intrusion Detection System with Real-Time Flow Feature Extraction., , , and . IEEE Big Data, page 6289-6291. IEEE, (2023)Aspect-based Meeting Transcript Summarization: A Two-Stage Approach with Weak Supervision on Sentence Classification., , , , , , , , , and . IEEE Big Data, page 636-645. IEEE, (2023)