Author of the publication

Access Control Method for Web of Things Based on Role and SNS.

, , and . CIT, page 316-321. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ASP2P: An advanced botnet based on social networks over hybrid P2P., and . WOCC, page 677-682. IEEE, (2013)Detection of IP Gangs: Strategically Organized Bots., and . ICDM, volume 10933 of Lecture Notes in Computer Science, page 254-265. Springer, (2018)F2MC: Enhancing Data Storage Services with Fog-toMultiCloud Hybrid Computing., , and . IPCCC, page 1-6. IEEE, (2019)The Social Web of Things (SWoT)- Structuring an Integrated Social Network for Human, Things and Services., , , and . J. Comput., 9 (2): 345-352 (2014)Design and Implementation of "The Belt and Road Initiative" Immersive Interaction System Based on UE4+GIS Platform., , , , , and . AIVR, page 89-97. ACM, (2021)A Novel Semi-supervised Anomaly Detection Method for Network Intrusion Detection., and . ICCT, page 1276-1280. IEEE, (2022)The analysis of security threats in structured P2P load balancing schemes., , and . CDC, page 296-301. IEEE Computer Society, (2011)Access Control Method for Web of Things Based on Role and SNS., , and . CIT, page 316-321. IEEE Computer Society, (2012)Global Flow Table: A convincing mechanism for security operations in SDN., , and . Comput. Networks, (2017)An efficient relay node selection scheme to improve the performance of P2P-based VoIP applications in Chinese internet., , , and . Multimedia Tools Appl., 64 (3): 599-625 (2013)