From post

An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets.

, , , , , и . ICCCS (2), том 11064 из Lecture Notes in Computer Science, стр. 601-611. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The consumer loan default predicting model - An application of DEA-DA and neural network., , , и . Expert Syst. Appl., 36 (9): 11682-11690 (2009)Enabling access-privacy for random walk based data analysis applications., и . Data Knowl. Eng., 63 (3): 667-683 (2007)Product market competition and R&D rivalry. Economics Letters, 58 (1): 105--111 (01.01.1998)An immune based dynamic risk control system., , , и . SSCI, стр. 1130-1137. IEEE, (2018)Analysis of a continuous finite element method for H(curl, div)-elliptic interface problem., , и . Numerische Mathematik, 123 (4): 671-707 (2013)A Construction and Accomplishment of ERP System for Coal Enterprises., , и . ICFCE, том 133 из Advances in Intelligent and Soft Computing, стр. 257-266. Springer, (2011)Convolutional Neural Networks for Comprehending Geographical Features of International Important Ramsar Wetland Ecological Habitat Scenes in China., , и . ISCID (1), стр. 214-217. IEEE, (2017)Continuous finite element schemes for a phase field model in two-layer fluid Bénard-Marangoni convection computations., , и . Comput. Phys. Commun., 185 (1): 63-78 (2014)An Iterative Perturbation Method for the Pressure Equation in the Simulation of Miscible Displacement in Porous Media., и . SIAM J. Sci. Comput., 19 (3): 893-911 (1998)A Class of Nonlinear Active Disturbance Rejection Loop Filters for Phase-Locked Loop., , и . IEEE Trans. Ind. Electron., 69 (2): 1920-1928 (2022)