Author:
Bhuyan Monowar H.,Elmroth Erik
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing P4-SDN Data Plane against Flow Table Modification Attack;NOMS 2024-2024 IEEE Network Operations and Management Symposium;2024-05-06
2. Unified Identification of Anomalies on the Edge: A Hybrid Sequential PGM Approach;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01
3. Anomaly Detection and Resolution on the Edge: Solutions and Future Directions;2023 IEEE International Conference on Service-Oriented System Engineering (SOSE);2023-07
4. Implementation of a Clustering-Based LDDoS Detection Method;Electronics;2022-09-06
5. Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach;International Journal of Information Technology;2022-02-01