搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Jim Yuill , Shyhtsun Felix Wu , Ming-Yuh Huang , Fengmin Gong
DOI:
关键词:
摘要:
,2011, 引用: 2
System and methods for detecting unwanted voice calls,2007, 引用: 0
Proceedings of the 13th Nordic Workshop on Secure IT-systems (NordSec 2008), October 9-10, 2008, Copenhagen, Denmark,2008, 引用: 1
,2002, 引用: 0
,2000, 引用: 703
,2002, 引用: 122
Intelligence and Security Informatics,2005, 引用: 7
Security and Communication Networks,2015, 引用: 5
International Journal of Computer Applications,2014, 引用: 2
Security and Communication Networks,2009, 引用: 41