From post

Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model.

, , , и . ICCCS (3), том 11065 из Lecture Notes in Computer Science, стр. 161-173. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimal full-duplex relay selection for physical layer security in cooperative wireless networks., , и . ICCC, стр. 1-6. IEEE, (2017)An improved algorithm for community discovery in social networks based on label propagation., и . FSKD, стр. 1493-1497. IEEE, (2015)Efficiently secure multiparty computation based on homomorphic encryption., , , и . CCIS, стр. 343-349. IEEE, (2016)Invisible Steganography via Generative Adversarial Network., , и . CoRR, (2018)One Prediction Model Based on BP Neural Network for Newcastle Disease., , , , и . CCTA (2), том 294 из IFIP Advances in Information and Communication Technology, стр. 1209-1216. Springer, (2008)Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population., , , , , , и . BMC Medical Imaging, (2012)Efficient data possession-checking protocol with deduplication in cloud., , , , и . IJDSN, (2017)Controlled remote state preparation of arbitrary two and three qubit states via the Brown state., , , , и . Quantum Inf. Process., 11 (6): 1653-1667 (2012)Two statistical traffic features for certain APT group identification., , , , , , , и . J. Inf. Secur. Appl., (2022)A Video Watermarking Algorithm of H.264/AVC for Content Authentication., , , , и . J. Networks, 7 (8): 1150-1154 (2012)