Search Results - Chen, Eric E.Y.
-
1
-
2
-
3
-
4
Using Call Patterns to Detect Unwanted Communication Callers
Conference Proceeding -
5
Using end-to-middle security to protect against evil twin access points
Conference Proceeding -
6
-
7
Detecting TCP-based DDoS attacks by linear regression analysis
Conference Proceeding -
8
-
9
-
10
-
11
-
12
-
13
Detecting DDoS Attacks by Analyzing Client Response Patterns
Conference Proceeding -
14
-
15
-
16