Author of the publication

Real-Time Malicious Traffic Detection With Online Isolation Forest Over SD-WAN.

, , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network protocol system monitoring: a formal approach with passive testing., , , , , and . IEEE/ACM Trans. Netw., 14 (2): 424-437 (2006)Can Longest Prefix Matching Make The Path Length Shorter?, , , and . JDCTA, 4 (8): 172-181 (2010)Inter-domain routing bottlenecks and their aggravation., , , , , , and . Comput. Networks, (2019)基于增量最短路径优先的域内高效路由保护算法 (Efficient Intra-domain Routing Protection Algorithm Based on i-SPF)., and . 计算机科学, 46 (8): 116-120 (2019)A Survey on Network Verification and Testing With Formal Methods: Approaches and Challenges., , , , , , , and . IEEE Commun. Surv. Tutorials, 21 (1): 940-969 (2019)Routing optimization with path cardinality constraints in a hybrid SDN., , , , and . Comput. Commun., (2021)MTL-FaultNet: Seismic Data Reconstruction Assisted Multitask Deep Learning 3-D Fault Interpretation., , , , , and . IEEE Trans. Geosci. Remote. Sens., (2023)HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning., , , , , , , , , and . Comput. Networks, (2020)A hybrid link protection scheme for ensuring network service availability in link-state routing networks., , , , , , , and . J. Commun. Networks, 22 (1): 46-60 (2020)threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning., , , , , , , , and . CoRR, (2021)