Author of the publication

A SIP-Based Flooding Attack Detection Method in VoIP Environment.

, , , and . ICITEE, page 680-684. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and analysis of factors affecting bending performance of multi-cavity flexible actuator., , , , , , and . J. Ambient Intell. Humaniz. Comput., 11 (12): 6283-6292 (2020)Algebraic Implementation of Extended Finite State Machine Networks., , , and . IEEE Trans. Circuits Syst. II Express Briefs, 71 (7): 3408-3412 (July 2024)Radar Working State Recognition Based on the Unsupervised and Incremental Method., , , , and . J. Sensors, (2021)An optimal condition-based maintenance policy for nonlinear stochastic degrading systems., , , , and . Reliab. Eng. Syst. Saf., (2024)Map Matching for Taxi GPS Data with Extreme Learning Machine., and . ADMA, volume 8933 of Lecture Notes in Computer Science, page 447-460. Springer, (2014)Research on Hotel Service Design from perspective of customer., , and . WHICEB, page 79. Association for Information Systems, (2014)Data-Apart Hybrid Centralized Scheduling in Coordinated Multi-Point System with Non-ideal Backhaul Link., , , , and . ICPCA/SWS, volume 7719 of Lecture Notes in Computer Science, page 297-301. Springer, (2012)SPENCER: a comprehensive database for small peptides encoded by noncoding RNAs in cancer patients., , , , , , and . Nucleic Acids Res., 50 (D1): 1373-1381 (2022)A SIP-Based Flooding Attack Detection Method in VoIP Environment., , , and . ICITEE, page 680-684. ACM, (2023)