Author of the publication

Vulnerability association evaluation of Internet of thing devices based on attack graph.

, , , , and . Int. J. Distributed Sens. Networks, 18 (5): 155013292210978 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulnerability association evaluation of Internet of thing devices based on attack graph., , , , and . Int. J. Distributed Sens. Networks, 18 (5): 155013292210978 (2022)Motivation Enhancement Design for Individual Exercise Habits Based on Multimodal Physiological Signals., , , , , , , and . HCI (19), volume 14029 of Lecture Notes in Computer Science, page 77-87. Springer, (2023)Predicting Rotator Cuff Tear Severity Using Radiographic Images and Machine Learning Techniques., , , , , , , , , and 1 other author(s). ICCPR, page 237-241. ACM, (2021)The simulated system dynamics analysis of the natural gas supply and demand., , and . Kybernetes, 39 (8): 1262-1269 (2010)Research on Decision Evaluation Model of HOV Lane Setting., , , and . Sci. Program., (2021)Analysis and comparison of different feedback schemes for coordinated cellular networks., , and . PIMRC, page 2365-2369. IEEE, (2010)An Efficient Network Motif Discovery Approach for Co-Regulatory Networks., , , and . IEEE Access, (2018)New Performance Results for Optimum Combining in Presence of Arbitrary-Power Interferers and Thermal Noise., , , and . IEICE Trans. Commun., 93-B (7): 1919-1922 (2010)Alcoholism detection by medical robots based on Hu moment invariants and predator-prey adaptive-inertia chaotic particle swarm optimization., , , , , , , , and . Comput. Electr. Eng., (2017)Identification of Alcoholism Based on Wavelet Renyi Entropy and Three-Segment Encoded Jaya Algorithm., , , , , and . Complex., (2018)