Cited By
View all- Wang JWen RLi JYan FZhao BYu F(2019)Detecting and Mitigating Target Link-Flooding Attacks Using SDNIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.282227516:6(944-956)Online publication date: 1-Nov-2019
- Dou ZKhalil IKhreishah A(2018)A Novel and Robust Authentication Factor Based on Network Communications LatencyIEEE Systems Journal10.1109/JSYST.2017.269155012:4(3279-3290)Online publication date: Dec-2018
- Dou ZKhalil IKhreishah AAl-Fuqaha AGuizani M(2017)Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing DetectionIEEE Communications Surveys & Tutorials10.1109/COMST.2017.275208719:4(2797-2819)Online publication date: Dec-2018
- Show More Cited By