From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A decentralized and personalized spam filter based on social computing., , , и . IWCMC, стр. 887-894. IEEE, (2014)Game Analysis and Optimization for Evolutionary Dynamic Heterogeneous Redundancy., , , и . IEEE Trans. Netw. Serv. Manag., 20 (4): 4186-4197 (декабря 2023)Game analysis and decision making optimization of evolutionary dynamic honeypot., , , , , , и . Comput. Electr. Eng., (2024)Performance Analysis of Honeypot with Petri Nets., , и . Inf., 9 (10): 245 (2018)CMTD: A Fast Moving Target Defense Scheme Based on CFL Authentication., , , , , и . IEEE Internet Things J., 12 (1): 822-833 (января 2025)Identity Authentication Strategy of Mobile Crowd Sensing based on CFL., , , и . QRS, стр. 139-146. IEEE, (2022)An Exploratory Study on Chinese Parents' Concerns about Preschoolers' Use of Digital Devices and Expectations for Digital Literacy Education., и . ASIST, том 59 из Proc. Assoc. Inf. Sci. Technol., стр. 706-708. Wiley, (2022)Port and Address Hopping for Active Cyber-Defense., , , и . PAISI, том 4430 из Lecture Notes in Computer Science, стр. 295-300. Springer, (2007)Automatic Patching Based on Social Computing in P2P Network., , и . EIDWT, стр. 471-478. IEEE Computer Society, (2013)Exploiting self-evolutionary strategies of components for Dynamic Heterogeneous Redundancy., , , и . Comput. Electr. Eng., (2024)