Login / Signup
A Novel Prevention Technique Using Deep Analysis Intruder Tracing with a Bottom-Up Approach Against Flood Attacks in VoIP Systems.
Sheeba Armoogum
Nawaz Mohamudally
Published in:
ICO (2021)
Keyphrases
</>
statistical analysis
distributed systems
social networks
information systems
data analysis
image analysis
web applications
data driven