Author of the publication

An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion.

, , , and . Future Internet, 13 (2): 40 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TRIZ Application to the Integrating Construction Techniques of Plate Pain to Improve Heat Resistance of the Steel Deck Roofs., , , and . ICKII, page 278-281. IEEE, (2018)A generic approach for network defense strategies generation based on evolutionary game theory., , , and . Inf. Sci., (2024)Two neural dynamics approaches for computing system of time-varying nonlinear equations., , , , , , and . Neurocomputing, (2020)Measuring Complex Permittivity of Soils by Waveguide Transmission/Reflection Method., , , , , and . IGARSS, page 7144-7147. IEEE, (2019)An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion., , , and . Future Internet, 13 (2): 40 (2021)Modified Newton Integration Neural Algorithm for Dynamic Complex-Valued Matrix Pseudoinversion Applied to Mobile Object Localization., , , , , , and . IEEE Trans. Ind. Informatics, 17 (4): 2432-2442 (2021)A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense., , , , and . Inf. Sci., (2021)A low-power design of a bridge scour monitoring system., , , and . I2MTC, page 30-34. IEEE, (2014)Fine-Grained Chinese Discourse Relation Labelling., , , and . LREC, European Language Resources Association (ELRA), (2016)Universal environmental surveillance system with instrument cloud technology., , , , , and . I2MTC, page 845-849. IEEE, (2013)