Author of the publication

Two-Stage Mixed Queuing Model for Web Security Gateway Performance Evaluation.

, , , , , and . ICCCN, page 1-7. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensitive Labels Matching Privacy Protection in Multi-Social Networks., , , , , and . ICC, page 1-7. IEEE, (2020)Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor., , , , , , and . Mob. Networks Appl., 26 (4): 1668-1685 (2021)Identification of unknown operating system type of Internet of Things terminal device based on RIPPER., , , , , and . IJDSN, (2018)Robust WLAN-Based Indoor Fine-Grained Intrusion Detection., , , , and . GLOBECOM, page 1-6. IEEE, (2016)Wii: Device-Free Passive Identity Identification via WiFi Signals., , , , , and . GLOBECOM, page 1-6. IEEE, (2017)Multi-pattern Matching Algorithm based on Variable Step Size., , and . ICCNS, page 125-128. ACM, (2018)Research on Task Scheduling Model for Multi-core Processor., , and . ICCNS, page 129-133. ACM, (2018)A Quantitative Evaluation Model for Network Security., , , , and . CIS, page 773-777. IEEE Computer Society, (2007)A Dynamic Event Region Tracking Approach Based on Node Calibration., , , and . ICAIS (1), volume 11632 of Lecture Notes in Computer Science, page 347-357. Springer, (2019)Robust WLAN-Based Indoor Intrusion Detection Using PHY Layer Information., , , , and . IEEE Access, (2018)