Author of the publication

Modeling Attack Process of Advanced Persistent Threat.

, , , , and . SpaCCS, volume 10066 of Lecture Notes in Computer Science, page 383-391. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fund-Constrained Investment Scheme for Profit Maximization in Cloud Computing., , and . IEEE Trans. Serv. Comput., 11 (6): 893-907 (2018)Implementing molecular dynamics simulation on the Sunway TaihuLight system with heterogeneous many-core processors., , , , and . Concurr. Comput. Pract. Exp., (2018)Hybrid immune algorithm based on greedy algorithm and delete-cross operator for solving TSP., , , and . Soft Comput., 20 (2): 555-566 (2016)Lazy-Merge: A Novel Implementation for Indexed Parallel K-Way In-Place Merging., , and . IEEE Trans. Parallel Distributed Syst., 27 (7): 2049-2061 (2016)An Anti-power Attacks Implementation of AES Algorithm in ASIC., , , and . HPCC/EUC, page 1640-1646. IEEE, (2013)A heuristic for task scheduling based on hasse diagram., , , and . BIC-TA, page 1085-1092. IEEE, (2010)PAR-3D-BLAST: A parallel tool for searching and aligning protein structures., and . Concurr. Comput. Pract. Exp., 26 (10): 1705-1714 (2014)A novel solution for the P2P network observer placement problem on DNA-based supercomputing., , , , , and . BIC-TA, page 185-189. IEEE, (2010)A MapReduce-Enabled Scientific Workflow Framework with Optimization Scheduling Algorithm., , , and . PDCAT, page 599-604. IEEE, (2012)Design and Analysis of a Novel Integral Design Scheme for Finding Finite-Time Solution of Time-Varying Matrix Inequalities., , , and . IEEE Trans. Emerg. Top. Comput., 10 (1): 267-279 (2022)