Author of the publication

A Cost-Effective Algorithm for Selecting Optimal Bandwidth to Clear Malicious Codes.

, , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defense of Advanced Persistent Threat on Industrial Internet of Things With Lateral Movement Modeling., , , , , and . IEEE Trans. Ind. Informatics, 19 (9): 9619-9630 (2023)A coalitional game-based joint monitoring mechanism for combating COVID-19., , , , , and . Comput. Commun., (February 2023)Network Calculus-based Routing and Scheduling in Software-defined Industrial Internet of Things., , , , , and . INDIN, page 463-468. IEEE, (2022)A Cost-Effective Algorithm for Selecting Optimal Bandwidth to Clear Malicious Codes., , , and . IEEE Access, (2020)A Risk Management Approach to Double-Virus Tradeoff Problem., , , , and . IEEE Access, (2019)False Data Injection- and Propagation-Aware Game Theoretical Approach for Microgrids., , , , , and . IEEE Trans. Smart Grid, 13 (5): 3342-3353 (2022)Spatial-Temporal Semantic Generative Adversarial Networks for Flexible Multi-step Urban Flow Prediction., , , and . ICANN (3), volume 13531 of Lecture Notes in Computer Science, page 763-775. Springer, (2022)Differential Game Approach for Modelling and Defense of False Data Injection Attacks Targeting Energy Metering Systems., , , , , and . TrustCom, page 97-104. IEEE, (2022)Data tampering attacks diagnosis in dynamic wireless sensor networks., , and . Comput. Commun., (2021)Dynamic Network Slicing Orchestration for Remote Adaptation and Configuration in Industrial IoT., , , , , and . IEEE Trans. Ind. Informatics, 18 (6): 4297-4307 (2022)