Author of the publication

An Efficient Flow Control Approach for SDN-Based Network Threat Detection and Migration Using Support Vector Machine.

, , , , and . ICEBE, page 56-63. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low-rank tensor completion with sparse regularization in a transformed domain., , and . Numer. Linear Algebra Appl., (2021)Low rank tensor completion with sparse regularization in a transformed domain., , and . CoRR, (2019)Deep forest-based hypertension and OSAHS patient screening model., , , , , and . Int. J. Inf. Commun. Technol., 16 (2): 112-122 (2020)Money demand and the relative price of capital goods in hyperinflations, and . Journal of Monetary Economics, 36 (2): 375--404 (November 1995)CRIME AND POVERTY: A SEARCH-THEORETIC APPROACH*, , and . International Economic Review, 45 (3): 909--938 (214 08 2004)doi: 10.1111/j.0020-6598.2004.00291.x.Return and risk interactions in Chinese stock markets, , and . Journal of International Financial Markets, Institutions and Money, 14 (4): 367--383 (October 2004)On the Connectivity of (4;g)-Cages., , and . Ars Comb., (2002)An improved trust model in agent-mediated e-commerce., , and . IJISTA, 4 (3/4): 271-284 (2008)A revised cut-peak function method for box constrained continuous global optimization., , and . Appl. Math. Comput., 194 (1): 224-233 (2007)A novel algebraic solution to the perspective-three-line pose problem., , and . Comput. Vis. Image Underst., (2020)