From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Network Security Situation Assessment Based on Stochastic Game Model., , , , , и . ICIC (1), том 6838 из Lecture Notes in Computer Science, стр. 517-525. Springer, (2011)New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory., , , , и . CIS, том 4456 из Lecture Notes in Computer Science, стр. 626-633. Springer, (2006)A Computational Model of Computer Worms Based on Persistent Turing Machines., , и . IEEE ICCI, стр. 453-456. IEEE Computer Society, (2006)Granularity and Usability in Authorization Policies., , , и . EISA, том 1403 из Communications in Computer and Information Science, стр. 68-86. Springer, (2021)Network Security Situation Assessment Based on HMM., , , , , и . ICIC (2), том 6839 из Lecture Notes in Computer Science, стр. 387-394. Springer, (2011)Evolvable Viral Agent Modeling and Exploration., , и . ICONIP (3), том 4234 из Lecture Notes in Computer Science, стр. 866-873. Springer, (2006)Minimization of the Redundant Coverage for Dense Wireless Sensor Networks., , , и . ICESS, том 4523 из Lecture Notes in Computer Science, стр. 415-424. Springer, (2007)Using RS and SVM to Detect New Malicious Executable Codes., , и . RSKT, том 4062 из Lecture Notes in Computer Science, стр. 574-579. Springer, (2006)Research on virus detection technique based on ensemble neural network and SVM., , , и . Neurocomputing, (2014)Research on Virus Detection Technology Based on Ensemble Neural Network and SVM., , и . ICIC (3), том 304 из Communications in Computer and Information Science, стр. 367-372. Springer, (2012)