Author of the publication

Defending Against Advanced Persistent Threat: A Risk Management Perspective.

, , , , , and . SciSec, volume 11287 of Lecture Notes in Computer Science, page 207-215. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending Against Advanced Persistent Threat: A Risk Management Perspective., , , , , and . SciSec, volume 11287 of Lecture Notes in Computer Science, page 207-215. Springer, (2018)A trust-based evaluation model for data privacy protection in cloud computing., , and . Int. J. High Perform. Comput. Netw., 14 (2): 147-156 (2019)Detection of abnormal profiles on group attacks in recommender systems., , , , and . SIGIR, page 955-958. ACM, (2014)A Cloud Service Selection Method Based on Trust and User Preference Clustering., , , , , and . IEEE Access, (2019)Personalized Web Service Recommendation Based on QoS Prediction and Hierarchical Tensor Decomposition., , , , , and . IEEE Access, (2019)Deadline-Constrained Cost Optimization Approaches for Workflow Scheduling in Clouds., , , , and . IEEE Trans. Parallel Distributed Syst., 28 (12): 3401-3412 (2017)IHG4MR: Interest-oriented heterogeneous graph for multirelational recommendation., , and . Expert Syst. Appl., (October 2023)An improved shuffled frog-leaping algorithm for the minmax multiple traveling salesman problem., , and . Neural Comput. Appl., 33 (24): 17057-17069 (2021)LGSA: A next POI prediction method by using local and global interest with spatiotemporal awareness., , , , , and . Expert Syst. Appl., (October 2023)Self-paced multi-label co-training., , , and . Inf. Sci., (April 2023)