From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An attack pattern mining algorithm based on fuzzy logic and sequence pattern., , , , , и . CCIS, стр. 234-238. IEEE, (2016)An Android malware detection method based on AndroidManifest file., , , , и . CCIS, стр. 239-243. IEEE, (2016)Phishing sites detection based on Url Correlation., , , , , и . CCIS, стр. 244-248. IEEE, (2016)A web page malicious script detection system., , , , , и . CCIS, стр. 394-399. IEEE, (2014)Attack pattern mining algorithm based on security log., , , , и . ISI, стр. 205. IEEE, (2017)Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering., , , и . Secur. Commun. Networks, (2017)Affine iterative closest point algorithm for point set registration., , , и . Pattern Recognit. Lett., 31 (9): 791-799 (2010)An Edge Caching Scheme to Distribute Content in Vehicular Networks., , , , , и . IEEE Trans. Veh. Technol., 67 (6): 5346-5356 (2018)Fast spatio-temporal decorrelation using FIR filter network with decoupled adaptive step sizes., , и . Digit. Signal Process., (2020)Defense Strategy of Network Security based on Dynamic Classification., , , , и . KSII Trans. Internet Inf. Syst., 9 (12): 5116-5134 (2015)