Author of the publication

Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall.

, , , , , and . DSC, page 526-531. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computational probing protein-protein interactions targeting small molecules., , , and . Bioinform., 32 (2): 226-234 (2016)Support vector machine prediction of enzyme function with conjoint triad feature and hierarchical context., , , and . BMC Syst. Biol., 5 (S-1): S6 (2011)Kernel-based data fusion improves the drug-protein interaction prediction., , , and . Comput. Biol. Chem., 35 (6): 353-362 (2011)Investigations on smart card-based secure protocols for autenticated key establishment in Digital pay-TV systems., , , and . IEEE ICCI, page 538-541. IEEE Computer Society, (2009)Improving accuracy of protein-protein interaction prediction by considering the converse problem for sequence representation., , , , and . BMC Bioinform., (2011)Network predicting drug's anatomical therapeutic chemical code., , , and . Bioinform., 29 (10): 1317-1324 (2013)The quasi-reversibility regularization method for backward problem of the multi-term time-space fractional diffusion equation., , , and . Commun. Nonlinear Sci. Numer. Simul., (April 2024)Skin cancer diagnosis based on optimized convolutional neural network., , , , , and . Artif. Intell. Medicine, (2020)Question on Conditional Entropy. CoRR, (2007)A New SPN Structure for Block Ciphers., , and . ICNSC, page 583-586. IEEE, (2008)