Author of the publication

A New Formula of Security Risk Analysis That Takes Risk Improvement Factor into Account.

. SocialCom/PASSAT, page 1243-1248. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Application Framework for Smart Education System Based on Mobile and Cloud Systems., , , , and . IEICE Trans. Inf. Syst., 100-D (10): 2399-2410 (2017)Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach., , , , and . J. Inf. Process., 22 (3): 464-471 (2014)A Riemannian Optimization Approach to the Matrix Singular Value Decomposition., and . SIAM J. Optim., 23 (1): 188-212 (2013)Sensing In-Air Signature Motions Using Smartwatch: A High-Precision Approach of Behavioral Authentication., and . IEEE Access, (2022)A resource-oriented grid meta-scheduler based on agents., and . Parallel and Distributed Computing and Networks, page 108-113. IASTED/ACTA Press, (2007)Dynamic risk evaluation model as a security field., , , and . GCCE, page 628-629. IEEE, (2015)Complex-Valued-based Learning Classifier System for POMDP Environments., , , and . CEC, page 1852-1859. IEEE, (2019)Probabilistic model building GP with Belief propagation., , , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2012)Learning non-linear ranking functions for web search using probabilistic model building GP., , , and . IEEE Congress on Evolutionary Computation, page 3371-3378. IEEE, (2013)Handling different level of unstable reward environment through an estimation of reward distribution in XCS., , , and . CEC, page 2973-2980. IEEE, (2015)