From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling and Verifying Intelligent Unit Transmission Protocol Using CSP Model Checker PAT., , , , и . QRS Companion, стр. 244-251. IEEE, (2016)Security Vulnerability Assessment of Power IoT based on Business Security., , , , и . CCRIS, стр. 128-135. ACM, (2020)Research on Abnormal Detection Technology of Real-Time Interaction Process in New Energy Network., , , , , и . iThings/GreenCom/CPSCom/SmartData, стр. 433-440. IEEE, (2019)The Abnormal Detection for Network Traffic of Power IoT Based on Device Portrait., , , , и . Sci. Program., (2020)A Novel Behavior-Based Tracking Attack for User Identification., , , , и . CBD, стр. 227-233. IEEE Computer Society, (2015)Continuous Trust Evaluation of Power Equipment and Users Based on Risk Measurement., , , , и . Sci. Program., (2020)NFA Regular Expression Matching based Electriuec Power Sensitive Data Recognition Algorithm Design and Simulation., , , , и . CNML, стр. 303-307. ACM, (2023)A Malicious Attack Correlation Analysis Method Integrating Interaction Process of Source-Grid-Load System., , , , , и . CCIS, стр. 1101-1106. IEEE, (2018)Dynamic Access Control and Authorization System based on Zero-trust architecture., , , и . CCRIS, стр. 123-127. ACM, (2020)