Author of the publication

A Client-Side Evil-Twin Attack Detection System with Threshold Considering Traffic Load.

, , , , and . ICCE-Berlin, page 68-69. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cost Sharing Method for a Mobile Tethering with a Coalitional Game Theory.. ICAIIC, page 291-296. IEEE, (2024)RDFization of database for folk implements and ontology-assisted information retrieval system., , , and . ICCE-TW, page 490-491. IEEE, (2015)AP Connection Method Considering Interference for Maximizing System Throughput Using Potential Game., , , and . CCNC, page 305-308. IEEE, (2023)Two Types of Flows Admission control by altruistic behavior based on warning.. ICNC, page 43-47. IEEE Computer Society, (2018)Theoretical Analysis of the Three-Dimensional CAC Considering Connection and Communication Quality., , , and . CoRR, (2024)Analysis of mean packet delay in DR-MPCP limited service using queueing theory., and . ONDM, page 160-165. IEEE, (2018)An Improved Design Scheme for Perceptual Hashing Based on CNN for Digital Watermarking., , , and . COMPSAC, page 1789-1794. IEEE, (2020)Three types of calls admission control methods considering seek-bar operation., and . IET Commun., 17 (12): 1394-1408 (July 2023)Exact Mean Packet Delay for Delayed Report Messages Multipoint Control Protocol in EPON., , and . JOCN, 10 (3): 209-219 (2018)Flow Admission Control Method with Bounded Rationality Using Stochastic Evolutionary Game Theory., and . GLOBECOM, page 1-6. IEEE, (2021)