Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A decentralized and personalized spam filter based on social computing., , , and . IWCMC, page 887-894. IEEE, (2014)Game Analysis and Optimization for Evolutionary Dynamic Heterogeneous Redundancy., , , and . IEEE Trans. Netw. Serv. Manag., 20 (4): 4186-4197 (December 2023)Game analysis and decision making optimization of evolutionary dynamic honeypot., , , , , , and . Comput. Electr. Eng., (2024)CMTD: A Fast Moving Target Defense Scheme Based on CFL Authentication., , , , , and . IEEE Internet Things J., 12 (1): 822-833 (January 2025)Performance Analysis of Honeypot with Petri Nets., , and . Inf., 9 (10): 245 (2018)Port and Address Hopping for Active Cyber-Defense., , , and . PAISI, volume 4430 of Lecture Notes in Computer Science, page 295-300. Springer, (2007)An Exploratory Study on Chinese Parents' Concerns about Preschoolers' Use of Digital Devices and Expectations for Digital Literacy Education., and . ASIST, volume 59 of Proc. Assoc. Inf. Sci. Technol., page 706-708. Wiley, (2022)Identity Authentication Strategy of Mobile Crowd Sensing based on CFL., , , and . QRS, page 139-146. IEEE, (2022)Full Service Hopping for Proactive Cyber-Defense., , and . ICNSC, page 1337-1342. IEEE, (2008)A Dynamic Trust Conference Algorithm for Social Network., , , , and . 3PGCIC, page 340-346. IEEE, (2013)