Author of the publication

Hidden target recognition method for high-speed network security threats based on attack graph theory.

, and . J. High Speed Networks, 29 (4): 307-320 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparative analysis of artificial neural network architectures for building energy consumption forecasting., , , and . Int. J. Distributed Sens. Networks, (2019)Blockchain Expansion to secure Assets with Fog Node on special Duty., , , , , and . Soft Comput., 24 (20): 15209-15221 (2020)Extracting and visualising human activity patterns of daily living in a smart home environment., , and . IET Commun., 5 (17): 2434-2442 (2011)Towards smarter cities: Learning from Internet of Multimedia Things-generated big data., , , , and . Future Gener. Comput. Syst., (2020)An efficient deep learning-assisted person re-identification solution for intelligent video surveillance in smart cities., , , , , and . Frontiers Comput. Sci., 17 (4): 174329 (August 2023)Multiple Electric Energy Consumption Forecasting Using a Cluster-Based Strategy for Transfer Learning in Smart Building., , , , , and . Sensors, 20 (9): 2668 (2020)Deep Learning Assisted Buildings Energy Consumption Profiling Using Smart Meter Data., , , , , , and . Sensors, 20 (3): 873 (2020)Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview., , , , , , , , and . Complex., (2022)A Segmentation-Less Efficient Alzheimer Detection Approach Using Hybrid Image Features., , , , , and . Handbook of Multimedia Information Security, Springer, (2019)Correction to: Robust facial landmark extraction scheme using multiple convolutional neural networks., , , , and . Multimedia Tools Appl., 78 (3): 3239 (2019)