1. Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants;Kuzmanovic,2003
2. New breed of attack zombies lurk;Delio,2001
3. The crosspath attack: Disrupting the {SDN} control channel via shared links;Cao,2019
4. Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search;Liu;IEEE Trans. Serv. Comput.,2020
5. Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications;Li;IEEE Internet Things J.,2018