Author of the publication

PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN.

, , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 3686-3698 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monocular scene flow estimation via variational method., , , and . Multim. Tools Appl., 76 (8): 10575-10597 (2017)Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency., , , and . Secur. Commun. Networks, (2021)Survey of Security Technologies on Wireless Sensor Networks., , , and . J. Sensors, (2015)Privacy Preservation in Role-based Access Control Model., , , , , and . J. Networks, 6 (8): 1106-1113 (2011)A Detection and Mitigation Scheme of LDoS Attacks via SDN Based on the FSS-RSR Algorithm., , , , , and . IEEE Trans. Netw. Sci. Eng., 10 (4): 1952-1963 (July 2023)MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN., , , , and . Mob. Networks Appl., 26 (4): 1705-1722 (2021)Structural Damage Identification Using the First-Order Vibration-Mode-Based Frequency-Shift Flexibility Sensitivity Algorithm., , and . Axioms, 12 (6): 551 (June 2023)A Cost-Aware Method of Privacy Protection for Multiple Cloud Service Requests., , and . CSE, page 583-590. IEEE Computer Society, (2014)Automated Trust Negotiation with Time Behavior., , , , , and . J. Networks, 6 (8): 1091-1098 (2011)FTODefender: An efficient flow table overflow attacks defending system in SDN., , , , , and . Expert Syst. Appl., 237 (Part B): 121460 (March 2024)