Author of the publication

Detection and Defense Methods of Cyber Attacks.

, , , and . MDATA: A New Knowledge Representation Model, volume 12647 of Lecture Notes in Computer Science, Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Research of Partitioning Model Based on Virtual Identity Data., , , and . APWeb Workshophs, volume 8710 of Lecture Notes in Computer Science, page 214-224. Springer, (2014)Internet-based Platform for an Integrated Design of Product and Manufacturing Process for SMEs., , and . CASE, page 314-318. IEEE, (2006)Community structure mining in big data social media networks with MapReduce., , , , , and . Clust. Comput., 18 (3): 999-1010 (2015)Harmonic Triangular Norm Aggregation Operators in Multicriteria Decision Systems., , and . J. Convergence Inf. Technol., 2 (1): 83-92 (2007)A Practical Approach to Answer Extraction for Constructing QA Solution., , , and . DSC, page 398-404. IEEE, (2018)A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G., , , and . DSC, page 567-572. IEEE Computer Society, (2016)Intrusion Detection Results Analysis Based on Variational Auto-Encoder., , , , , and . DSC, page 516-521. IEEE, (2019)FSM-Based Cyber Security Status Analysis Method., , , , , , and . DSC, page 510-515. IEEE, (2019)Cost-Efficient Processing of Continuous Extreme Queries over Distributed Data Streams., , , and . WAIM, page 157-164. IEEE Computer Society, (2008)A Security Model for Networked Manufacturing System., , and . CIS, page 745-749. IEEE Computer Society, (2007)