Author of the publication

The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model.

, and . WISM (1), volume 6987 of Lecture Notes in Computer Science, page 283-293. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model., and . WISM (1), volume 6987 of Lecture Notes in Computer Science, page 283-293. Springer, (2011)Using support vector machines for prediction of protein structural classes based on discrete wavelet transform., , , and . Journal of Computational Chemistry, 30 (8): 1344-1350 (2009)Hybrid Implicit Iteration Process for a Finite Family of Non-Self-Nonexpansive Mappings in Uniformly Convex Banach Spaces., , and . J. Appl. Math., (2014)A Fast and Tolerant Voting Mechanism in Wireless Sensor Networks., and . WISM (1), volume 6987 of Lecture Notes in Computer Science, page 271-282. Springer, (2011)Multi-factor and Distributed Clustering Routing Protocol in Wireless Sensor Networks., , , and . Wirel. Pers. Commun., 95 (3): 2127-2142 (2017)ISCP: An Improved Blockchain Consensus Protocol., , , , and . Int. J. Netw. Secur., 21 (3): 359-367 (2019)Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery., , , and . Int. J. Netw. Secur., 20 (6): 1033-1041 (2018)Smart World of Internet of Things (IoT) and Its Security Concerns., and . iThings/GreenCom/CPSCom/SmartData, page 240-245. IEEE, (2016)An energy-efficient multi-hop routing protocol based on grid clustering for wireless sensor networks., , , and . Clust. Comput., 20 (4): 3071-3083 (2017)