Author of the publication

A Generation Method of Network Security Hardening Strategy Based on Attack Graphs.

, , , , and . Int. J. Web Serv. Res., 12 (1): 45-61 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Construction of Rate-Compatible Raptor-Like QC-LDPC Code for Enhanced IDMA in 5G and Beyond., and . ISTC, page 1-5. IEEE, (2018)The adaptive complex shock diffusion for seismic random noise attenuation., and . GlobalSIP, page 333-337. IEEE, (2017)Exploiting the Security Aspects of Compressive Sampling., , , , and . Secur. Commun. Networks, (2018)Energy Management and Cross Layer Optimization for Wireless Sensor Network Powered by Heterogeneous Energy Sources., , , and . IEEE Trans. Wirel. Commun., 14 (5): 2814-2826 (2015)Anomaly detection of vectorized time series on aircraft battery data., , , , , and . Expert Syst. Appl., (October 2023)A Generation Method of Network Security Hardening Strategy Based on Attack Graphs., , , , and . Int. J. Web Serv. Res., 12 (1): 45-61 (2015)A Continuous-Time Algorithm for Distributed Optimization Based on Multiagent Networks., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 49 (12): 2700-2709 (2019)Reversible data hiding in encrypted color images using cross-channel correlations., , , and . J. Vis. Commun. Image Represent., (2021)TPE2: Three-Pixel Exact Thumbnail-Preserving Image Encryption., , , , and . Signal Process., (2021)Reusing the permutation matrix dynamically for efficient image cryptographic algorithm., , , , and . Signal Process., (2015)