Author of the publication

Assessment of Network Security Policy Based on Security Capability.

, and . CSSE (3), page 906-910. IEEE Computer Society, (2008)978-0-7695-3336-0.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Network Security Policy Model and Its Realization Mechanism., , , and . Inscrypt, volume 4318 of Lecture Notes in Computer Science, page 168-181. Springer, (2006)基于语义相似度的静态安全策略一致性检测 (Static Security Policy Consistency Detection Based on Semantic Similarity)., , , , and . 计算机科学, 42 (8): 166-169 (2015)A Dual SIS Epidemic Model for Virus Spread Analysis in Cluster-Based Wireless Sensor Networks., and . MLICOM, volume 251 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 652-662. Springer, (2018)Implementation and Realization of Network Security Policy Based on Rule Engine., and . J. Networks, 6 (3): 438-445 (2011)Analysis of TDOA based radar target positioning in LOS and NLOS environments., , , and . Int. J. Wirel. Mob. Comput., 6 (4): 313-320 (2013)A Comparative Study of Power Line Communication Networks With and Without Buffer., , , and . Int. J. Commun. Networks Inf. Secur., (2012)一种基于GA-FAHP的软件漏洞风险评估方法 (Risk Assessment of Software Vulnerability Based on GA-FAHP)., , , , and . 计算机科学, 42 (9): 134-138 (2015)Modeling and Analysis of Network Security Situation Prediction Based on Covariance Likelihood Neural., , , and . ICIC (3), volume 6840 of Lecture Notes in Computer Science, page 71-78. Springer, (2011)Impact of sensing errors on the performance of an unreliable opportunistic spectrum sharing system., , , , and . Int. J. Wirel. Mob. Comput., 10 (3): 197-204 (2016)An Adversarial and Deep Hashing-based Hierarchical Supervised Cross-Modal Image and Text Retrieval Algorithm., , , , , and . Int. J. Robotics Autom., 39 (1): 77-86 (2024)