Author of the publication

Activity Based CIM Modeling and Transformation for Business Process Systems.

, , , , and . Int. J. Softw. Eng. Knowl. Eng., 20 (3): 289-309 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on the Aggregation and Synchronization of LDDoS Attack Based On Euclidean Distance., , and . J. Softw., 9 (7): 1854-1861 (2014)The Security Evaluation of ATM Information System Based on Bayesian Regularization., , , , , and . J. Softw., 9 (6): 1587-1594 (2014)Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network., , , , and . IEEE Access, (2020)Adaptive Speech Information Hiding Method Based on K-Means., , and . IEEE Access, (2020)ECDSA-Based Message Authentication Scheme for BeiDou-II Navigation Satellite System., , and . IEEE Trans. Aerosp. Electron. Syst., 55 (4): 1666-1682 (2019)BD-II NMA&SSI: An Scheme of Anti-Spoofing and Open BeiDou II D2 Navigation Message Authentication., , and . IEEE Access, (2020)The detection method of low-rate DoS attack based on multi-feature fusion., , , and . Digit. Commun. Networks, 6 (4): 504-513 (2020)WNN-Based Prediction of Security Situation Awareness for the Civil Aviation Network., , and . J. Intell. Syst., 24 (1): 55-67 (2015)Search mechanism for data contents based on bloom filter and tree hybrid structure in system wide information management., , , and . IET Commun., 17 (11): 1262-1273 (July 2023)Mitigation measures of collusive interest flooding attacks in named data networking., , , , and . Comput. Secur., (2020)