Author of the publication

Network Security Situation Assessment Based on HMM.

, , , , , and . ICIC (2), volume 6839 of Lecture Notes in Computer Science, page 387-394. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Security Situation Assessment Based on HMM., , , , , and . ICIC (2), volume 6839 of Lecture Notes in Computer Science, page 387-394. Springer, (2011)An adaptive fault tolerance strategy for cloud storage., , and . KSII Trans. Internet Inf. Syst., 10 (11): 5290-5304 (2016)Network Security Situation Assessment Based on Stochastic Game Model., , , , , and . ICIC (1), volume 6838 of Lecture Notes in Computer Science, page 517-525. Springer, (2011)A Secure and Efficient Privacy-Preserving Range Query Scheme in Location-Based Services., , , , and . IEEE Access, (2018)An accurate and efficient two-phase scheme for detecting Android cloned applications., , , and . Concurr. Comput. Pract. Exp., (2021)MobileNetV3-YOLOv5-based Network Model for Pedestrian Detection., , and . CSCloud/EdgeCom, page 144-149. IEEE, (2023)Improvement of Web Semantic and Transformer-Based Knowledge Graph Completion in Low-Dimensional Spaces., , , , and . Int. J. Semantic Web Inf. Syst., 20 (1): 1-18 (2024)Network Security Situation Assessment Based on Hidden Semi-Markov Model., , , , and . ICIC (1), volume 6838 of Lecture Notes in Computer Science, page 509-516. Springer, (2011)