From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Combination Attacks and Defenses on SDN Topology Discovery., , , , , , , , и . IEEE/ACM Trans. Netw., 31 (2): 904-919 (апреля 2023)Intrinsic Security and Self-Adaptive Cooperative Protection Enabling Cloud Native Network Slicing., , , и . IEEE Trans. Netw. Serv. Manag., 18 (2): 1287-1304 (2021)Machine Learning based Malicious Payload Identification in Software-Defined Networking., , , , , , и . CoRR, (2021)Think That Attackers Think: Using First-Order Theory of Mind in Intrusion Response System., , , , и . GLOBECOM, стр. 1-6. IEEE, (2019)Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks., , , , , и . Sci. China Inf. Sci., 65 (8): 1-3 (2022)In-band Network Telemetry Manipulation Attacks and Countermeasures in Programmable Networks., , , , , , и . IWQoS, стр. 1-10. IEEE, (2023)STEP: Spatial-Temporal Network Security Event Prediction., , , и . CoRR, (2021)AFTM: An Adaptive Flow Table Management Scheme for OpenFlow Switches., , , и . HPCC/DSS/SmartCity, стр. 917-922. IEEE, (2020)Guarding the Perimeter of Cloud-Based Enterprise Networks: An Intelligent SDN Firewall., , , , , и . HPCC/SmartCity/DSS, стр. 897-902. IEEE, (2018)