Author of the publication

Reasoning crypto ransomware infection vectors with Bayesian networks.

, , and . ISI, page 149-151. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks., , and . TrustCom/BigDataSE/ISPA (1), page 1272-1278. IEEE, (2015)Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model., , and . Comput. Secur., (February 2024)A Real Implementation of DPI in 3G Network., , , , , , , , and . GLOBECOM, page 1-5. IEEE, (2010)Reasoning crypto ransomware infection vectors with Bayesian networks., , and . ISI, page 149-151. IEEE, (2017)TCSTM: A task-characteristic-considered steady-state thermal model of multicore processors., , , and . Microprocess. Microsystems, (2018)DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment., , and . Int. J. Inf. Secur. Priv., 15 (3): 1-18 (2021)Security Issues and Solutions in Federate Learning Under IoT Critical Infrastructure., and . Wirel. Pers. Commun., 129 (1): 475-500 (March 2023)Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment., , , and . Wirel. Pers. Commun., 117 (4): 3505-3525 (2021)Design and Implementation of Cloud Server Remote Management System Based on IMPI Protocol., and . UIC/ATC/ScalCom, page 1475-1478. IEEE Computer Society, (2015)Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol., , , and . Wireless Personal Communications, 42 (1): 49-62 (2007)