From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Network Security Policy Model and Its Realization Mechanism., , , и . Inscrypt, том 4318 из Lecture Notes in Computer Science, стр. 168-181. Springer, (2006)基于语义相似度的静态安全策略一致性检测 (Static Security Policy Consistency Detection Based on Semantic Similarity)., , , , и . 计算机科学, 42 (8): 166-169 (2015)一种基于GA-FAHP的软件漏洞风险评估方法 (Risk Assessment of Software Vulnerability Based on GA-FAHP)., , , , и . 计算机科学, 42 (9): 134-138 (2015)Impact of sensing errors on the performance of an unreliable opportunistic spectrum sharing system., , , , и . Int. J. Wirel. Mob. Comput., 10 (3): 197-204 (2016)Modeling and Analysis of Network Security Situation Prediction Based on Covariance Likelihood Neural., , , и . ICIC (3), том 6840 из Lecture Notes in Computer Science, стр. 71-78. Springer, (2011)An Adversarial and Deep Hashing-based Hierarchical Supervised Cross-Modal Image and Text Retrieval Algorithm., , , , , и . Int. J. Robotics Autom., 39 (1): 77-86 (2024)A Dual SIS Epidemic Model for Virus Spread Analysis in Cluster-Based Wireless Sensor Networks., и . MLICOM, том 251 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 652-662. Springer, (2018)Implementation and Realization of Network Security Policy Based on Rule Engine., и . J. Networks, 6 (3): 438-445 (2011)Analysis of TDOA based radar target positioning in LOS and NLOS environments., , , и . Int. J. Wirel. Mob. Comput., 6 (4): 313-320 (2013)A Comparative Study of Power Line Communication Networks With and Without Buffer., , , и . Int. J. Commun. Networks Inf. Secur., (2012)