Author of the publication

Using Call Patterns to Detect Unwanted Communication Callers.

, , and . SAINT, page 64-70. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Android as a server platform., , , , and . CCNC, page 1181-1185. IEEE, (2011)A countermeasure againstDDOS attacks using active networks technologies., , and . Ann. des Télécommunications, 58 (3-4): 605-629 (2003)Convex Hull of the Union of Convex Objects in the Plane: an Adaptive Analysis., and . CCCG, (2008)Space-Efficient Algorithms for Klee's Measure Problem., and . CCCG, page 27-30. (2005)FSP: Federation of Service Providers on the Internet., and . ISCC, page 1213-1218. IEEE Computer Society, (2003)A Space-Efficient Algorithm for Segment Intersection., and . CCCG, page 68-71. (2003)In-place 2-d nearest neighbor search., and . SODA, page 904-911. SIAM, (2008)Demonstration of synchronized information-sharing method on Web., , , and . CCNC, page 826-827. IEEE, (2011)Geometric Streaming Algorithms with a Sorting Primitive.. ISAAC, volume 4835 of Lecture Notes in Computer Science, page 512-524. Springer, (2007)AEGIS: An Active-Network-Powered Defense Mechanism against DDoS Attacks.. IWAN, volume 2207 of Lecture Notes in Computer Science, page 1-15. Springer, (2001)