Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing the effectiveness of an advanced persistent threat., , , , and . CoRR, (2017)Optimal control of computer virus under a delayed model., , , and . Appl. Math. Comput., 218 (23): 11613-11619 (2012)MGC-GAN: Multi-Graph Convolutional Generative Adversarial Networks for Accurate Citywide Traffic Flow Prediction., , , , and . SMC, page 2557-2562. IEEE, (2022)A cost-effective rumor-containing strategy., , , , and . CoRR, (2017)Routing and wavelength assignment for 3-ary n-cube in array-based optical network., , , and . Inf. Process. Lett., 112 (6): 252-256 (2012)Defending Against Advanced Persistent Threat: A Risk Management Perspective., , , , , and . SciSec, volume 11287 of Lecture Notes in Computer Science, page 207-215. Springer, (2018)Detecting Change Intervals with Isolation Distributional Kernel., , , , , , and . J. Artif. Intell. Res., (2024)Defend against advanced persistent threats: An optimal control approach., , , , , and . CoRR, (2017)Effectiveness analysis of a mixed rumor-quelling strategy., , , , and . J. Frankl. Inst., 355 (16): 8079-8105 (2018)Robust Zero Trust Architecture: Joint Blockchain based Federated learning and Anomaly Detection based Framework., , , and . CoRR, (2024)