Cited By
View all- Jiang XShi QMiao HCao WHe HChen SYang J(2024)Credible Link Flooding Attack Detection and Mitigation: A Blockchain-Based ApproachIEEE Transactions on Network and Service Management10.1109/TNSM.2024.335766021:3(3537-3554)Online publication date: Jun-2024
- Lu TDing XShang JZhao PZhang H(2024)DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite NetworksApplied Cryptography and Network Security10.1007/978-3-031-54773-7_11(265-282)Online publication date: 29-Feb-2024
- Xie LMeng SYao WZhang X(2023)Differential Pricing Strategies for Bandwidth Allocation With LFA Resilience: A Stackelberg Game ApproachIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.329918118(4899-4914)Online publication date: 2023
- Show More Cited By