From post

Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph.

, , , и . ICAIS (2), том 11633 из Lecture Notes in Computer Science, стр. 62-74. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

One Prediction Model Based on BP Neural Network for Newcastle Disease., , , , и . CCTA (2), том 294 из IFIP Advances in Information and Communication Technology, стр. 1209-1216. Springer, (2008)Optimal full-duplex relay selection for physical layer security in cooperative wireless networks., , и . ICCC, стр. 1-6. IEEE, (2017)An improved algorithm for community discovery in social networks based on label propagation., и . FSKD, стр. 1493-1497. IEEE, (2015)Efficiently secure multiparty computation based on homomorphic encryption., , , и . CCIS, стр. 343-349. IEEE, (2016)Evolutionary machine learning builds smart education big data platform: Data-driven higher education., , , , , и . Appl. Soft Comput., (марта 2023)Faithful quantum entanglement purification and concentration using heralded high-fidelity parity-check detectors based on quantum-dot-microcavity systems., , , , и . Quantum Inf. Process., 21 (1): 17 (2022)Controlled remote state preparation of arbitrary two and three qubit states via the Brown state., , , , и . Quantum Inf. Process., 11 (6): 1653-1667 (2012)Two statistical traffic features for certain APT group identification., , , , , , , и . J. Inf. Secur. Appl., (2022)Invisible Steganography via Generative Adversarial Network., , и . CoRR, (2018)Efficient data possession-checking protocol with deduplication in cloud., , , , и . IJDSN, (2017)