Author of the publication

An improved network security situation assessment approach in software defined networks.

, , , and . Peer-to-Peer Netw. Appl., 12 (2): 295-309 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sense-Based Topic Word Embedding Model for Item Recommendation., , , , , and . IEEE Access, (2019)Heterogeneous Identity Expression and Association Method Based on Attribute Aggregation "In Prepress"., , , and . J. Web Eng., 19 (7-8): 284-302 (2020)Internet of Things Monitoring System of Modern Eco-Agriculture Based on Cloud Computing., , , , and . IEEE Access, (2019)Heterogeneous identity trust management method based on risk assessment., , , and . J. Intell. Fuzzy Syst., 41 (3): 4691-4704 (2021)Multi-location cryptographic code repair with neural-network-based methodologies.. ESEC/SIGSOFT FSE, page 1640-1644. ACM, (2021)Deployment-quality and Accessible Solutions for Cryptography Code Development., , , , , , , , , and . CODASPY, page 174-176. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects., , , , , , , and . CCS, page 2455-2472. ACM, (2019)Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers., , and . DSC, page 1-8. IEEE, (2019)Dynamic Modelling and Numerical Simulation of Formation Control for Intelligent Multi-agent System with Target Geometric Configuration., and . Appl. Math. Comput., (May 2023)Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks., , , , and . IEEE Trans. Software Eng., 49 (2): 485-497 (February 2023)