From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A trust and attribute-based access control framework in internet of things., , и . Int. J. Embed. Syst., 12 (1): 116-124 (2020)Network Attack Prediction Method Based on Threat Intelligence., , , и . ICCCS (3), том 11065 из Lecture Notes in Computer Science, стр. 151-160. Springer, (2018)Access Control Based Resource Allocation in Cloud Computing Environment., , и . Int. J. Netw. Secur., 19 (2): 236-243 (2017)Research on information compression method based on Beidou short message., , и . ICIIP, стр. 5-10. ACM, (2018)A Multi-Level Security Access Control Framework for Cross-Domain Networks., , и . CSE/EUC (2), стр. 316-319. IEEE Computer Society, (2017)Research on Spectrum Resource Allocation Based on Cognition in LTE System., и . CSE/EUC (2), стр. 273-276. IEEE Computer Society, (2017)LTE/WLAN Heterogeneous Wireless Network Access Control Research., , и . CSE/EUC (2), стр. 238-241. IEEE Computer Society, (2017)Trust and Attribute-Based Dynamic Access Control Model for Internet of Things., , , и . CyberC, стр. 342-345. IEEE, (2017)Network attack prediction method based on threat intelligence for IoT., , , , и . Multimedia Tools Appl., 78 (21): 30257-30270 (2019)A dynamic resource allocation scheme based on cognition in LTE system., , и . Int. J. Wirel. Mob. Comput., 16 (4): 281-289 (2019)