Author:
Cao Xudong,Zhao Shangru,Zhang Yuqing
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mining classification algorithms to identify flooding attacks through the HTTP/3 protocol;2023 IEEE International Conference on Communications Workshops (ICC Workshops);2023-05-28
2. Multi-Access Edge Computing assisted ultra-low energy scheduling and harvesting in multi-hop Wireless Sensor and Actuator Network for energy neutral self-sustainable Next-gen Cyber-Physical System;Future Generation Computer Systems;2023-04
3. TLS Early Data Resistance to Replay Attacks in Wireless Internet of Things;GLOBECOM 2022 - 2022 IEEE Global Communications Conference;2022-12-04
4. Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study;International Journal of Information Security;2022-12-02
5. Manipulated Client Initial Attack and Defense of QUIC;2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2022-12