Author:
Feng Xuewei,Li Qi,Sun Kun,Xu Ke,Liu Baojun,Zheng Xiaofeng,Yang Qiushi,Duan Haixin,Qian Zhiyun
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Toward Practical Inter-Domain Source Address Validation;IEEE/ACM Transactions on Networking;2024-08
2. Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection;IEEE/ACM Transactions on Networking;2024-08
3. Threat Modeling for ML-based Topology Prediction in Vehicular Edge Computing Architecture;2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech);2023-11-14
4. Poster: Off-Path DNSSEC Downgrade Attacks;Proceedings of the ACM SIGCOMM 2023 Conference;2023-09
5. Protection Schemes for DDoS, ARP Spoofing, and IP Fragmentation Attacks in Smart Factory;Systems;2023-04-20