Login / Signup
End-to-End Detection of Caller ID Spoofing Attacks.
Hossen A. Mustafa
Wenyuan Xu
Ahmad-Reza Sadeghi
Steffen Schulz
Published in:
IEEE Trans. Dependable Secur. Comput. (2018)
Keyphrases
</>
end to end
text localization and recognition
admission control
multipath
ad hoc networks
content delivery
wireless ad hoc networks
high bandwidth
congestion control
internet protocol
ddos attacks
traffic analysis
rate allocation