From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Software structure characteristic measurement method based on weighted network., , , , и . Comput. Networks, (2019)An Improved OLAP Join and Aggregate Algorithm Based on Dimension Hierarchy., , , и . FSKD (5), стр. 169-172. IEEE Computer Society, (2009)An Approach for Database Intrusion Detection Based on the Event Sequence Clustering., , , и . NCM, стр. 584-588. IEEE Computer Society, (2009)An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets., , и . TrustCom/BigDataSE, стр. 1777-1784. IEEE, (2018)Software System Representation Methods Based on Algebraic Component., , , , и . TrustCom/BigDataSE, стр. 1008-1013. IEEE, (2018)Memory errors prevention technology for C/C++ program based on probability., , , , и . NLPKE, стр. 233-237. IEEE, (2011)Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification., , , , , , и . Computing, 106 (8): 2875-2896 (августа 2024)A Practical Method to Confine Sensitive API Invocations on Commodity Hardware., , , , , и . NSS, том 10394 из Lecture Notes in Computer Science, стр. 145-159. Springer, (2017)A Quantitative Method for Evaluating Network Security Based on Attack Graph., , и . NSS, том 10394 из Lecture Notes in Computer Science, стр. 349-358. Springer, (2017)SulleyEX: A Fuzzer for Stateful Network Protocol., , , , и . NSS, том 10394 из Lecture Notes in Computer Science, стр. 359-372. Springer, (2017)