Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the model-checking-based IDS.. CoRR, (2018)Thermal-Aware Modeling and Analysis for a Power Distribution Network Including Through-Silicon-Vias in 3-D ICs., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 38 (7): 1278-1290 (2019)Detecting air-gapped attacks using machine learning., , , , , , and . Cogn. Syst. Res., (2019)The optimization of pricing strategy for the wind power equipment aftermarket service., , , , and . Ind. Manag. Data Syst., 119 (3): 521-546 (2019)Benchmark Tests for the Model-Checking-Based IDS Algorithms., , , , and . IEEE Access, (2019)TCP/IP Model for Metaverse Networks and Some Potential Applications., , , , , , and . J. Softw., 17 (4): 158-167 (2022)CTL model checking based on binary classification of machine learning., and . Int. Arab J. Inf. Technol., 19 (2): 249-260 (2022)Getting more third-party participants on board: Optimal pricing and investment decisions in competitive platform ecosystems., , , , and . Eur. J. Oper. Res., 307 (1): 177-192 (May 2023)The Algorithms of Weightening Based on DNA Sticker Model., , and . ICPCSEE (2), volume 902 of Communications in Computer and Information Science, page 250-262. Springer, (2018)Mimic automata: A novel formal model for mimic computing., , , , and . Cogn. Syst. Res., (2019)