Author of the publication

A Scalable, Vulnerability Modeling and Correlating Method for Network Security.

, , , and . Infoscale, volume 18 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 217-227. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scalable, Vulnerability Modeling and Correlating Method for Network Security., , , and . Infoscale, volume 18 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 217-227. Springer, (2009)Stability Conditions for Discrete Delayed Hopfield Neural Networks., , and . ICNC (1), page 468-472. IEEE Computer Society, (2007)Stability Conditions for Discrete Hopfield Neural Networks with Delay., and . ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 476-481. Springer, (2006)Attractors of Discrete Cellular Neural Networks., , and . AICI (3), volume 7004 of Lecture Notes in Computer Science, page 293-299. Springer, (2011)Stability Conditions for Discrete Delayed Hopfield Networks in Serial Updating Mode., , and . ICNC (3), page 334-338. IEEE Computer Society, (2008)Convergence Study of Discrete Neural Networks with Delay., and . ICONIP (1), volume 4232 of Lecture Notes in Computer Science, page 554-561. Springer, (2006)