Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effects of Competition and Reputation on Auditing Cloud Service Provider's Security Commitment., and . IEEE Syst. J., 17 (1): 306-313 (March 2023)The application of neural network for software vulnerability detection: a review., , , and . Neural Comput. Appl., 35 (2): 1279-1301 (2023)Modeling and Control of Malware Propagation in Wireless IoT Networks., , , , and . Secur. Commun. Networks, (2021)Pattern dynamics of a spatial epidemic model with time delay., , , and . Appl. Math. Comput., (2017)An Automated Worm Containment Scheme., and . WISM, volume 6318 of Lecture Notes in Computer Science, page 187-193. Springer, (2010)Efficient defense strategy against spam and phishing email: An evolutionary game model., and . J. Inf. Secur. Appl., (2021)Pattern Dynamics of an SIS Epidemic Model with Nonlocal Delay., , , , and . Int. J. Bifurc. Chaos, 29 (2): 1950027:1-1950027:12 (2019)Influence of removable devices on computer worms: Dynamic analysis and control strategies., , , , and . Comput. Math. Appl., 61 (7): 1823-1829 (2011)An Incentive Mechanism for Reporting Phishing E-Mails Based on the Tripartite Evolutionary Game Model., and . Secur. Commun. Networks, (2021)Information-Aware Secure Routing in Wireless Sensor Networks., , , , , and . Sensors, 20 (1): 165 (2020)