From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The named data networking flow filter: Towards improved security over information leakage attacks., , , , и . Comput. Networks, (2020)Generating IoT Traffic in Smart Home Environment., , , и . CCNC, стр. 1-2. IEEE, (2020)Detecting IoT Traffic Anomalies in Smart Home Environment., , , и . ICCE-TW, стр. 1-2. IEEE, (2019)Entropy-based IoT Devices Identification., , , и . APNOMS, стр. 73-78. IEEE, (2020)Early Detection System for Gas Leakage and Fire in Smart Home Using Machine Learning., , , и . ICCE, стр. 1-6. IEEE, (2019)Generating IoT traffic: A Case Study on Anomaly Detection., , , и . LANMAN, стр. 1-6. IEEE, (2020)Name anomaly detection for ICN., , , , и . LANMAN, стр. 1-6. IEEE, (2016)Caching Strategies for Information Centric Networking: Opportunities and Challenges., , и . CoRR, (2016)Risk analysis of information-leakage through interest packets in NDN., , , , и . INFOCOM Workshops, стр. 360-365. IEEE, (2017)Unit Traffic Classification by Two-stage Clustering on P2PTV Applications., , , и . ICCE-TW, стр. 1-2. IEEE, (2021)