Author of the publication

Mitigating Content Poisoning With Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe for Energy Management in Smart Cities.

, , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating network path loss episode frequency by passive measurement., , and . BMEI, page 1457-1461. IEEE, (2012)Useful Traffic Loss Rate Estimation Based on Network Layer Measurement., , and . IEEE Access, (2019)A Time-Series Decomposed Model of Network Traffic., , and . ICNC (2), volume 3611 of Lecture Notes in Computer Science, page 338-345. Springer, (2005)Detection of Superpoints Using a Vector Bloom Filter., , , and . IEEE Trans. Inf. Forensics Secur., 11 (3): 514-527 (2016)Clustering and Profiling IP Hosts Based on Traffic Behavior., , , and . J. Networks, 10 (2): 99-107 (2015)A Current-stress-optimized Control Strategy for DAB Converter Using Hybrid Modulation., , , , , , and . IECON, page 1148-1153. IEEE, (2020)IP backbone traffic behavior characteristic spectrum composing and role mining., , , , and . CCF Trans. Netw., 2 (3-4): 153-171 (2019)Attack scenario reconstruction via fusing heterogeneous threat intelligence., , , and . Comput. Secur., (October 2023)Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement., , , , and . Comput. Commun., (2022)Optimal trajectory searching based differential evolution., , , and . Int. J. Wirel. Mob. Comput., 8 (4): 384-393 (2015)