Author of the publication

国家电网边缘计算信息系统安全风险评估方法研究 (Research on Security Risk Assessment Method of State Grid Edge Computing Information System).

, , , , , and . 计算机科学, 46 (11A): 428-432 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks., , and . TrustCom/BigDataSE/ISPA (1), page 1272-1278. IEEE, (2015)Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks., , , and . KSII Trans. Internet Inf. Syst., 13 (6): 3258-3279 (2019)Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model., , and . Comput. Secur., (February 2024)Bayesian network based weighted APT attack paths modeling in cloud computing., , and . Future Gener. Comput. Syst., (2019)Mitigating replay attacks with ZigBee solutions., and . Netw. Secur., 2018 (1): 13-19 (2018)Reasoning crypto ransomware infection vectors with Bayesian networks., , and . ISI, page 149-151. IEEE, (2017)TCSTM: A task-characteristic-considered steady-state thermal model of multicore processors., , , and . Microprocess. Microsystems, (2018)国家电网边缘计算信息系统安全风险评估方法研究 (Research on Security Risk Assessment Method of State Grid Edge Computing Information System)., , , , , and . 计算机科学, 46 (11A): 428-432 (2019)Multilabels-Based Scalable Access Control for Big Data Applications., , and . IEEE Cloud Comput., 1 (3): 65-71 (2014)DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment., , and . Int. J. Inf. Secur. Priv., 15 (3): 1-18 (2021)