Author of the publication

Study on network security situation awareness based on particle swarm optimization algorithm.

, and . Comput. Ind. Eng., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A LSTM-Based Method for Comprehension and Evaluation of Network Security Situation., and . TrustCom/BigDataSE, page 723-728. IEEE, (2019)Network security situation assessment based on dual attention mechanism and HHO-ResNeXt., , and . Connect. Sci., (December 2023)Wireless and Service Allocation for Mobile Computation Offloading with Task Deadlines., , , and . CoRR, (2023)A versatile roaming service framework with billing support for WLAN/cellular integrated networks., , , and . QSHINE, page 38. ACM, (2007)Research on the Knowledge Map of Combat Simulation Domain Based on Relational Database., , , , , and . HCC, volume 12634 of Lecture Notes in Computer Science, page 319-325. Springer, (2020)Joint Job Partitioning and Collaborative Computation Offloading for Internet of Things., , , and . IEEE Internet of Things Journal, 6 (1): 1046-1059 (2019)Short-Text Sentiment Analysis Based on Windowed Word Vector., , , , , , and . CSPS (3), volume 517 of Lecture Notes in Electrical Engineering, page 168-174. Springer, (2018)Digital Twins From a Networking Perspective., , , , , , and . IEEE Internet Things J., 9 (23): 23525-23544 (2022)Efficient call admission control for heterogeneous services in wireless mobile ATM networks., , and . IEEE Commun. Mag., 38 (10): 72-78 (2000)Survey of Technology in Network Security Situation Awareness., , , and . Sensors, 23 (5): 2608 (March 2023)