Author of the publication

Theoretical studies on the formation mechanism and explosive performance of nitro-substituted 1, 3, 5-triazines.

, , , , , and . J. Comput. Chem., 31 (13): 2483-2492 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theoretical studies on the formation mechanism and explosive performance of nitro-substituted 1, 3, 5-triazines., , , , , and . J. Comput. Chem., 31 (13): 2483-2492 (2010)A New Approximation of the Receive Minimum Distance and Its Application to MIMO Systems., , , and . IEICE Trans. Commun., 90-B (2): 385-387 (2007)Software decoys for insider threat., and . AsiaCCS, page 93-94. ACM, (2012)AntiBot: Clustering Common Semantic Patterns for Bot Detection., , , and . COMPSAC, page 262-272. IEEE Computer Society, (2010)Suppression of Edge Effects Based on Analytic Model for Leakage Current Reduction of Sub-40 nm DRAM Device., , , , , , and . IEICE Trans. Electron., 93-C (5): 658-661 (2010)A design failure pre-alarming system using score- and vote-based associative classification., and . Expert Syst. Appl., (2021)Fast malware classification by automated behavioral graph matching., , , and . CSIIRW, page 45. ACM, (2010)Deriving common malware behavior through graph clustering., , and . Comput. Secur., (2013)Tracing Traffic through Intermediate Hosts that Repacketize Flows., , , , and . INFOCOM, page 634-642. IEEE, (2007)Mechanophotopatterning on a Photoresponsive Elastomer, , , and . Advanced Materials, 23 (17): 1977--1981 (2011)