Search Results for Yu, Shui. - Narrowed by: Yu, Shui. author.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dYu$00252C$002bShui.$0026qf$003dAUTHOR$002509Author$002509Yu$00252C$002bShui.$002bauthor.$002509Yu$00252C$002bShui.$002bauthor.$0026ps$003d300?
2024-08-28T09:26:21Z
Distributed Denial of Service Attack and Defense
ent://SD_ILS/0/SD_ILS:484833
2024-08-28T09:26:21Z
2024-08-28T09:26:21Z
Author Yu, Shui. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-9491-1">https://doi.org/10.1007/978-1-4614-9491-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malicious Attack Propagation and Source Identification
ent://SD_ILS/0/SD_ILS:482633
2024-08-28T09:26:21Z
2024-08-28T09:26:21Z
Author Jiang, Jiaojiao. author. Wen, Sheng. author. Liu, Bo. author. Yu, Shui. author. Xiang, Yang. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Delay Tolerant Networks
ent://SD_ILS/0/SD_ILS:518478
2024-08-28T09:26:21Z
2024-08-28T09:26:21Z
Author Gao, Longxiang. author. Yu, Shui. author. Luan, Tom H. author. Zhou, Wanlei. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518478.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-18108-0">https://doi.org/10.1007/978-3-319-18108-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>