From post

A Novel Algorithm for Identifying Key Function Nodes in Software Network Based on Evidence Theory.

, , , , , и . International Journal of Software Engineering and Knowledge Engineering, 29 (3): 415-432 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Vulnerability Detection Model for Java Systems Based on Complex Networks., , , , и . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, стр. 1339-1347. IEEE, (2019)IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering., , , и . Symmetry, 10 (11): 561 (2018)Velocity tracking control of nodes for the nonlinear complex dynamical networks associated with outgoing links subsystem., , , и . Comput. Commun., (января 2024)Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme., , , , , и . Neurocomputing, (2023)Large-Capacity Local Multi-Dimensional Information Hiding Method for 6G Networks., , , , , , и . IEEE Netw., 36 (4): 160-165 (2022)AdaGUM: An Adaptive Graph Updating Model-Based Anomaly Detection Method for Edge Computing Environment., , , , , и . Secur. Commun. Networks, (2021)An Adaptive Ensemble Machine Learning Model for Intrusion Detection., , , , и . IEEE Access, (2019)Predicting Vulnerable Software Components Using Software Network Graph., , , и . CSS, том 10581 из Lecture Notes in Computer Science, стр. 280-290. Springer, (2017)Digital watermarking method for image feature point extraction and analysis., , , и . Int. J. Intell. Syst., 37 (10): 7281-7299 (2022)ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds., , , и . IEEE Trans. Dependable Secur. Comput., 20 (5): 4070-4084 (сентября 2023)