From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model., , , , и . ISPEC, том 7863 из Lecture Notes in Computer Science, стр. 44-59. Springer, (2013)A parameter-free approach to lossless summarization of fully dynamic graphs., , , , и . Inf. Sci., (2022)Natural Language Information Hiding Based on Chinese Mathematical Expression., , , и . Int. J. Netw. Secur., 8 (1): 10-15 (2009)Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency., , , и . Secur. Commun. Networks, (2021)BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement., , , , , , и . HPCC/DSS/SmartCity/DependSys, стр. 391-398. IEEE, (2021)CNN-BiLSTM-Attention: A multi-label neural classifier for short texts with a small set of labels., , , и . Inf. Process. Manag., 60 (3): 103320 (мая 2023)DGGCN: Dictionary based DGA detection method based on DomainGraph and GCN., , , , , , и . ICCCN, стр. 1-10. IEEE, (2022)STIDM: A Spatial and Temporal Aware Intrusion Detection Model., , , , , , , и . TrustCom, стр. 370-377. IEEE, (2020)CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network., , , , , , и . SecureComm, том 462 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 57-71. Springer, (2022)Global Daily VIIRS LST Product Quality Evaluation and Applications., и . IGARSS, стр. 1440-1443. IEEE, (2023)