Author of the publication

Computer Crime Forensics Based on Improved Decision Tree Algorithm.

, , and . J. Networks, 9 (4): 1005-1011 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unbalanced tree-formed verification data for trusted platforms., , and . Secur. Commun. Networks, 9 (7): 622-633 (2016)Cryptanalysis of Two Efficient Password-based Authentication Schemes Using Smart Cards., and . Int. J. Netw. Secur., 17 (6): 728-735 (2015)Web Application Security Based on Trusted Network Connection., and . WISM (2), volume 6988 of Lecture Notes in Computer Science, page 420-427. Springer, (2011)Program Detection with Context Dependency for Collaborative Services., and . CSCWD, page 48-53. IEEE, (2006)Anomaly Detection with High Deviations for System Security., and . PRDC, page 200-207. IEEE Computer Society, (2005)Study on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information., , and . J. Intell. Fuzzy Syst., 28 (5): 2225-2232 (2015)Model of Trusted Dynamic Measurement Based on System Calls., , and . WISM (3), volume 238 of Communications in Computer and Information Science, page 238-241. Springer, (2011)A framework of cloud service selection based on trust mechanism., , and . Int. J. Ad Hoc Ubiquitous Comput., 25 (3): 109-119 (2017)Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage., , , and . Int. J. Netw. Secur., 19 (5): 720-726 (2017)Computer Crime Forensics Based on Improved Decision Tree Algorithm., , and . J. Networks, 9 (4): 1005-1011 (2014)