From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Intelligent Smishing Detection System for Massive Users., , , , , , , и . CCIS, стр. 199-206. IEEE, (2023)New Security Attack and Defense Mechanisms Based on Negative Logic System and Its Applications., , , , , и . SciSec, том 11287 из Lecture Notes in Computer Science, стр. 172-180. Springer, (2018)Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules., , , , и . Comput. J., 65 (9): 2262-2275 (2022)Self-paced and Reweighting PU Learning for Imbalanced Malicious Traffic Detection., , , и . GLOBECOM, стр. 6018-6023. IEEE, (2023)Research on Identity Authentication Method Based on Negative Logic System., , , , и . CNCERT, том 970 из Communications in Computer and Information Science, стр. 3-15. Springer, (2018)USLD: A New Approach for Preserving Location Privacy in LBS., и . WISA, стр. 181-186. IEEE, (2017)Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation., , , , и . CNCERT, том 970 из Communications in Computer and Information Science, стр. 165-176. Springer, (2018)Container Privilege Escalation and Escape Detection Method Based on Security-First Architecture., , , , , , , и . HPCC/DSS/SmartCity/DependSys, стр. 490-498. IEEE, (2023)Research on security evaluation of cloud computing based on attack graph., , , , и . CCIS, стр. 459-465. IEEE, (2012)