Author:
Butcher David,Li Xiangyang,Guo Jinhua
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Subject
Electrical and Electronic Engineering,Computer Science Applications,Human-Computer Interaction,Information Systems,Software,Control and Systems Engineering
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Real Impact of the Blockchain in Securing a ToIP Network;International Journal of Security and Privacy in Pervasive Computing;2023-06-08
2. Clues in Tweets;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07
3. Using Game Theory to Defend Elastic and Inelastic Services Against DDoS Attacks;Lecture Notes in Networks and Systems;2022-06-28
4. A Machine Learning Framework towards Bank Telemarketing Prediction;Journal of Risk and Financial Management;2022-06-16
5. A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures;INT J COMPUT SCI NET;2022