Author of the publication

The Engineering, Economic and Environmental Electricity Simulation Tool (E4ST): Description and an Illustration of Its Capability and Use as a Planning/Policy Analysis Tool.

, , , , , , , and . HICSS, page 2317-2325. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting duration of traffic accidents based on cost-sensitive Bayesian network and weighted K-nearest neighbor., , , , and . J. Intell. Transp. Syst., 23 (2): 161-174 (2019)A Novel Probabilistic Model for Link Unification Grammar., , , and . IWPT, Tsinghua University Press, (2001)CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6., , , , , and . ISCC, page 1327-1330. IEEE, (2023)WDMTI: Wireless Device Manufacturer and Type Identification Using Hierarchical Dirichlet Process., , , , , and . MASS, page 19-27. IEEE Computer Society, (2018)SpoofingGuard: A Content-agnostic Framework for Email Spoofing Detection via Delivery Graph., , , , and . CSCWD, page 1098-1105. IEEE, (2023)DualDNSMiner: A Dual-Stack Resolver Discovery Method Based on Alias Resolution., , , , , , and . CollaborateCom (3), volume 563 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 347-364. Springer, (2023)IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic., , , , and . ISCC, page 1-7. IEEE, (2019)SeeStar: An Efficient Starlink Asset Detection Framework., , , , , and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 139-156. Springer, (2023)AP Selection for Indoor Localization Based on Neighborhood Rough Sets., and . VTC Fall, page 1-5. IEEE, (2012)Location Privacy in Buildings: A 3-Dimensional K-Anonymity Model., and . MSN, page 195-200. IEEE Computer Society, (2014)