From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Research on trusted computing and its development., , , , , , , , и . Sci. China Inf. Sci., 53 (3): 405-433 (2010)Connectivity Probability Based Spray and Wait Routing Algorithm in Mobile Opportunistic Networks., , , и . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, стр. 1636-1642. IEEE, (2018)Dynamic Group Behavior Analysis and Its Application in Network Abnormal Behavior Detection., , , , и . ChinaCom (2), том 237 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 292-301. Springer, (2017)Research on Secure and Reconfigurable Architecture Based on Embedded Hardware., , и . DASC, стр. 127-131. IEEE Computer Society, (2009)Research and Implement of Secure Bootstrap for Virtual Machine Based on Trusted Computing Platform., , и . DASC, стр. 514-519. IEEE Computer Society, (2009)Design Secure Contexts Detect Based on Lattice for Grid Computing Environment., , , и . ISECS, стр. 110-113. IEEE Computer Society, (2008)SQL injection attack sample generation based on IE-GAN., , , , и . TrustCom, стр. 1014-1021. IEEE, (2023)Automated Verification of Noninterference Property., , , , , и . ICICS, том 11149 из Lecture Notes in Computer Science, стр. 629-646. Springer, (2018)