Author of the publication

Modelling and Analysis of Network Security - An Algebraic Approach.

, , and . Trustcom/BigDataSE/ISPA, page 308-315. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chemical Basis of Metabolic Network Organization., , , , , , and . PLoS Comput. Biol., (2011)Chemical Basis of Metabolic Network Organization, , , , , , , , , and 4 other author(s). PLoS Comput. Biol., (2011)The Impact of Oxygen on Metabolic Evolution: A Chemoinformatic Investigation., , , , , and . PLoS Comput. Biol., (2012)Analysis of a repairable k-out-of-n: G system with repairman's multiple delayed vacations., , , and . Int. J. Comput. Math., 93 (12): 2141-2161 (2016)Computation and transient analysis of a k-out-of-n: G repairable system with general repair times., , , and . Operational Research, 15 (2): 307-324 (2015)LanguageTool based University rumor detection on Sina Weibo., , and . BigComp, page 453-454. IEEE, (2017)Modelling and Analysis Network Security - a PVCCS approach., , and . CoRR, (2015)The Testing Method for Interface Customized Component., , and . ATC, volume 6407 of Lecture Notes in Computer Science, page 228-241. Springer, (2010)Multiscale Feature Fusion for the Multistage Denoising of Airborne Single Photon LiDAR., , , , , , , , , and . Remote. Sens., 15 (1): 269 (January 2023)Design of Bird Sound Recognition Model Based on Lightweight., , and . IEEE Access, (2022)