From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

High-Speed File Transferring Over Linux Bridge for QGA Enhancement in Cyber Range., , , , , и . ICAIS (4), том 11635 из Lecture Notes in Computer Science, стр. 452-462. Springer, (2019)GRU and Multi-autoencoder based Insider Threat Detection for Cyber Security., , , , , и . DSC, стр. 203-210. IEEE, (2021)A network threat analysis method combined with kernel PCA and LSTM-RNN., , и . ICACI, стр. 508-513. IEEE, (2018)Spatial low-discrepancy sequences, spherical cone discrepancy, and applications in financial modeling., , и . J. Comput. Appl. Math., (2015)An Intelligent Network Attack Detection Method Based on RNN., , , , , и . DSC, стр. 483-489. IEEE, (2018)A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS., , , и . DSC, стр. 238-241. IEEE Computer Society, (2017)Entropy Based Sub-band Deletion for Multispectral Image Compression., , , , , , и . PCM (2), том 10736 из Lecture Notes in Computer Science, стр. 787-797. Springer, (2017)A Competitive Combat Strategy and Tactics in RTS Games AI and StarCraft., , , , , , и . PCM (2), том 10736 из Lecture Notes in Computer Science, стр. 3-12. Springer, (2017)Deep Learning Based Attribute Classification Insider Threat Detection for Data Security., , , и . DSC, стр. 576-581. IEEE, (2018)GT-Based Performance Improving for Resource Management of Computational Grid., , , , и . GCC, том 3795 из Lecture Notes in Computer Science, стр. 1072-1077. Springer, (2005)