Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The named data networking flow filter: Towards improved security over information leakage attacks., , , , and . Comput. Networks, (2020)Detecting IoT Traffic Anomalies in Smart Home Environment., , , and . ICCE-TW, page 1-2. IEEE, (2019)Entropy-based IoT Devices Identification., , , and . APNOMS, page 73-78. IEEE, (2020)Generating IoT Traffic in Smart Home Environment., , , and . CCNC, page 1-2. IEEE, (2020)Early Detection System for Gas Leakage and Fire in Smart Home Using Machine Learning., , , and . ICCE, page 1-6. IEEE, (2019)Generating IoT traffic: A Case Study on Anomaly Detection., , , and . LANMAN, page 1-6. IEEE, (2020)Caching Strategies for Information Centric Networking: Opportunities and Challenges., , and . CoRR, (2016)Risk analysis of information-leakage through interest packets in NDN., , , , and . INFOCOM Workshops, page 360-365. IEEE, (2017)Name anomaly detection for ICN., , , , and . LANMAN, page 1-6. IEEE, (2016)CoreCast: How core/edge separation can help improving inter-domain live streaming., , , , , and . Comput. Networks, 54 (18): 3388-3401 (2010)