Author of the publication

一种基于知识图谱的扩展攻击图生成方法 (Extended Attack Graph Generation Method Based on Knowledge Graph).

, , , and . 计算机科学, 46 (12): 165-173 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Binary matrix factorization for analyzing gene expression data., , , , and . Data Min. Knowl. Discov., 20 (1): 28-52 (2010)A Novel Method for Semi-automatic \2D\ to \3D\ Video Conversion, , , , , and . (2008)PGAAS: A prokaryotic genome assembly assistant system., , , and . German Conference on Bioinformatics, page 45. German Research Center for Biotechnology, (2001)A Connectionist Approach to Vertex Covering Problems., , and . Int. J. Neural Syst., 3 (1): 43-56 (1992)On Virtualizing Ethernet Switches., , and . ICCCN, page 8-13. IEEE, (2008)Bridging Domains with Words: Opinion Analysis with Matrix Tri-factorizations., , , and . SDM, page 293-302. SIAM, (2010)Design and simulated characteristics of a new biped mechanism., and . Robotica, 33 (7): 1568-1588 (2015)Experimental Study of Disruption-Tolerant Transport Protocol for Mobile Ad-Hoc Networks with Connection Diversity., , , and . Trustcom/BigDataSE/ISPA, page 1613-1620. IEEE, (2016)Corrigendum to "Exponential state estimation for recurrent neural networks with distributed delays" Neurocomputing 71(1-3) (2007) 428-438., and . Neurocomputing, 71 (7-9): 1753-1758 (2008)Synchronization control for arrays of coupled discrete-time delayed Cohen-Grossberg neural networks., , and . Neurocomputing, 74 (1-3): 197-204 (2010)