Author of the publication

Dynamic Attack and Defense Security Situation Assessment Model for Power Information Physical Fusion System.

, , , , , and . ICII, page 152-155. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Hair Segmentation in Complex Background., , and . ROBIO, page 2496-2501. IEEE, (2019)A Security Control Model Based on Petri Net for Industrial IoT., , , , , and . ICII, page 156-159. IEEE, (2019)Dynamic Attack and Defense Security Situation Assessment Model for Power Information Physical Fusion System., , , , , and . ICII, page 152-155. IEEE, (2019)eRAID: Conserving Energy in Conventional Disk-Based RAID System., , and . IEEE Trans. Computers, 57 (3): 359-374 (2008)New Constructions of Equality Test Scheme Without Random Oracles., , , , , and . IEEE Access, (2023)PHISS: Progressive and hierarchical image segmentation-sharing scheme., , , , and . Digit. Signal Process., (2022)Shifted declustering: a placement-ideal layout scheme for multi-way replication storage architecture., , and . ICS, page 134-144. ACM, (2008)Minmizing service span with batch-position-based learning effects., , , and . Optim. Lett., 15 (2): 553-567 (2021)Reliability Analysis on Shifted and Random Declustering Block Layouts in Scale-Out Storage Architectures., , , , and . NAS, page 148-157. IEEE Computer Society, (2014)A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems., , , , and . ICII, page 62-65. IEEE, (2019)