Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Association Rule-Based Method to Detect and Classify Botnets., , , and . Secur. Commun. Networks, (2021)An equalisation control method for network big data transmission based on parallel computing., , , , and . Int. J. Internet Protoc. Technol., 13 (1): 32-38 (2020)Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus., , , , and . Int. J. Pattern Recognit. Artif. Intell., 33 (14): 1955015:1-1955015:15 (2019)Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning., , , and . Secur. Commun. Networks, (2020)Moving target defense controller of mobile system based on Openflow sensor security scheme., and . Comput. Commun., (2020)Transaction-based classification and detection approach for Ethereum smart contract., , , , , , , , and . Inf. Process. Manag., 58 (2): 102462 (2021)Anti-Attack Intrusion Detection Model Based on MPNN and Traffic Spatiotemporal Characteristics., , , , and . J. Grid Comput., 21 (4): 60 (December 2023)具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate)., , , , and . 计算机科学, 45 (7): 135-138 (2018)An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning., , , , , and . Secur. Commun. Networks, (2019)Integrating Traffics with Network Device Logs for Anomaly Detection., , , , , , and . Secur. Commun. Networks, (2019)