Author of the publication

Computer Vulnerability Evaluation Using Fault Tree Analysis.

, , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 302-313. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Human-human vs. human-robot teamed investigation., , , and . HRI, page 405-406. ACM, (2012)Predicting severity of bug report by mining bug repository with concept profile., , , and . SAC, page 1553-1558. ACM, (2015)A Research about Value Order Measurement System of Traditional Chinese Medicine Syndrome Elements., , , , , and . ICMB, page 74-79. IEEE, (2014)AUV Underwater Positioning Algorithm Based on Interactive Assistance of SINS and LBL., , and . Sensors, 16 (1): 42 (2016)Unemployment duration and economic incentives--a quasi random-assignment approach, and . European Economic Review, 49 (7): 1799--1825 (October 2005)New constructions of quantum MDS convolutional codes derived from generalized Reed-Solomon codes., , and . CoRR, (2015)Evaluation of sound classification algorithms for hearing aid applications., , , and . ICASSP, page 185-188. IEEE, (2010)Combining multilevel feature extraction and multi-loss learning for person re-identification., , , , and . Neurocomputing, (2019)Research on Simulation-Experimentation-Based Effectiveness Evaluation of Digitized Force's Command and Control System., , , and . AsiaSim, volume 402 of Communications in Computer and Information Science, page 355-360. Springer, (2013)A Novel Parallel Motion Estimation Design and Implementation on GPU., , , and . IEEE Access, (2019)