Author of the publication

Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features.

. J. Cyber Secur. Mobil., 12 (5): 697-710 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A theoretical study of solvent effects on tautomerism and electronic absorption spectra of 3-hydroxy-2-mercaptopyridine and 2, 3-dihydroxypyridine., , , , and . J. Comput. Chem., 25 (15): 1833-1839 (2004)Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features.. J. Cyber Secur. Mobil., 12 (5): 697-710 (2023)How to Increase Interest in Studying Functional Programming via Interdisciplinary Application., , , , , and . TFPIE, volume 321 of EPTCS, page 37-54. (2020)Computational studies on the dimers and the thermal dimerization of norbornadiene., , and . J. Comput. Chem., 29 (8): 1250-1258 (2008)Wind Power Smoothing by Controlling the Inertial Energy of Turbines With Optimized Energy Yield., , , and . IEEE Access, (2017)An attack pattern mining algorithm based on fuzzy logic and sequence pattern., , , , , and . CCIS, page 234-238. IEEE, (2016)Phishing sites detection based on Url Correlation., , , , , and . CCIS, page 244-248. IEEE, (2016)Mechanisms of norbornadiene dimerization to Binor-S using cationic CoI, RhI, and IrI catalysts., , , , and . J. Comput. Chem., 31 (12): 2248-2257 (2010)Theoretical studies on the gas-phase pyrolysis of 2-phenoxycarboxylic acids: An ONIOM approach., , , and . J. Comput. Chem., 24 (8): 963-972 (2003)Cost Optimization Control of Logistics Service Supply Chain Based on Cloud Genetic Algorithm., and . Wireless Personal Communications, 102 (4): 3171-3186 (2018)