Author of the publication

A Partition Matching Method for Optimal Attack Path Analysis.

, , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 120-126. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software structure characteristic measurement method based on weighted network., , , , and . Comput. Networks, (2019)An Improved OLAP Join and Aggregate Algorithm Based on Dimension Hierarchy., , , and . FSKD (5), page 169-172. IEEE Computer Society, (2009)A Practical Method to Confine Sensitive API Invocations on Commodity Hardware., , , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 145-159. Springer, (2017)A Quantitative Method for Evaluating Network Security Based on Attack Graph., , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 349-358. Springer, (2017)SulleyEX: A Fuzzer for Stateful Network Protocol., , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 359-372. Springer, (2017)An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets., , and . TrustCom/BigDataSE, page 1777-1784. IEEE, (2018)Software System Representation Methods Based on Algebraic Component., , , , and . TrustCom/BigDataSE, page 1008-1013. IEEE, (2018)Memory errors prevention technology for C/C++ program based on probability., , , , and . NLPKE, page 233-237. IEEE, (2011)An Approach for Database Intrusion Detection Based on the Event Sequence Clustering., , , and . NCM, page 584-588. IEEE Computer Society, (2009)Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification., , , , , , and . Computing, 106 (8): 2875-2896 (August 2024)