Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The research and implementation of intelligent mobile video supervising system based on DSP., , , , , , , , and . CCIS, page 657-660. IEEE, (2012)A New Information Security Risk Assessment Method in Power Production System Based on Rough Sets and Bayesian Network., , , and . IIH-MSP, page 532-536. IEEE, (2014)Blind Spots Analysis of Magnetic Tensor Localization Method., , , , , and . Remote. Sens., 15 (8): 2199 (April 2023)Stability analysis of software networks., , , , , and . CCIS, page 681-684. IEEE, (2012)A New Detection Algorithm of Moving Objects Based on Human Morphology., , , and . IIH-MSP, page 411-414. IEEE, (2012)Cyber Security Risk Assessment of Communication Network of Substation Based on Improved Grey Clustering., , , and . IIH-MSP, page 524-527. IEEE, (2014)Techniques and Research Trends of Network Testbed., , , and . IIH-MSP, page 537-541. IEEE, (2014)An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation., , , , , and . Critical Infrastructure Protection, volume 441 of IFIP Advances in Information and Communication Technology, page 79-91. Springer, (2014)The Design of ICS Testbed Based on Emulation, Physical, and Simulation (EPS-ICS Testbed)., , , , and . IIH-MSP, page 420-423. IEEE, (2013)Designated Verifier Signature Scheme over Circulant Matrices., , , , , and . IIH-MSP, page 420-423. IEEE, (2012)