Author of the publication

A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion.

, , , , , , and . J. Netw. Comput. Appl., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research of Secure Intranet/Internet Access Platform Based on Ontology., , , and . J. Networks, 4 (10): 1009-1016 (2009)An Epidemiology-Based Model for Disclosing Dynamics of Malware Propagation in Heterogeneous and Mobile WSNs., , , , , and . IEEE Access, (2020)How to protect reader lending privacy under a cloud environment: a technical method., , , , and . Libr. Hi Tech, 40 (6): 1746-1765 (2022)An Effective Edge-Intelligent Service Placement Technology for 5G-and-Beyond Industrial IoT., , , , , and . IEEE Trans. Ind. Informatics, 18 (6): 4148-4157 (2022)Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton., , , , and . Int. J. Distributed Sens. Networks, 16 (11): 155014772097294 (2020)STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things., , , , , and . J. Netw. Comput. Appl., (May 2023)HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNs., , , , , , and . J. Netw. Comput. Appl., (2019)Survivability evaluation towards attacked WSNs based on stochastic game and continuous-time Markov chain., , , , and . Appl. Soft Comput., 12 (5): 1467-1476 (2012)A dummy-based user privacy protection approach for text information retrieval., , , , and . Knowl. Based Syst., (2020)Heterogeneous Graph Contrastive Multi-view Learning., , , , , and . CoRR, (2022)