Author of the publication

An Attack Vector Evaluation Method for Smart City Security Protection.

, , and . WiMob, page 1-7. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unsupervised Anomaly Detection for Container Cloud Via BILSTM-Based Variational Auto-Encoder., , , , and . ICASSP, page 3024-3028. IEEE, (2022)ApkClassiFy: Identification and Classification of packed Android Malicious Applications., , , , , and . GLOBECOM, page 2092-2097. IEEE, (2022)An Attack Vector Evaluation Method for Smart City Security Protection., , and . WiMob, page 1-7. IEEE, (2019)Taas: Trust assessment as a service for secure communication of green edge-assisted UAV network., , , , , and . Peer Peer Netw. Appl., 17 (4): 2221-2236 (July 2024)ContainerGuard: A Real-Time Attack Detection System in Container-Based Big Data Platform., , , , , , and . IEEE Trans. Ind. Informatics, 18 (5): 3327-3336 (2022)MURAS: An Efficient Multi-Value-Proof-Based Remote Attestation Scheme for Cloud Platform., , , , , and . ICCNS, page 98-104. ACM, (2022)Autoscaling cracker: an efficient asymmetric DDoS attack on serverless functions., , , , , and . GLOBECOM, page 4179-4184. IEEE, (2022)UAVs-assisted QoS guarantee scheme of IoT applications for reliable mobile edge computing., , , , , and . Comput. Commun., (2024)PCP: A Privacy-Preserving Content-Based Publish-Subscribe Scheme With Differential Privacy in Fog Computing., , , , and . IEEE Access, (2017)vTPM-SM: An Application Scheme of SM2/SM3/SM4 Algorithms Based on Trusted Computing in Cloud Environment., , , , , and . CLOUD, page 351-356. IEEE, (2022)