Author of the publication

零知识下的比特流未知协议分类模型 (Unknown Bit-stream Protocol Classification Model with Zero-knowledge).

, , , , and . 计算机科学, 43 (8): 39-44 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resonant bifurcation of feed-forward chains and application in image contrast enhancement., , and . Math. Comput. Simul., (2021)Steady State Bifurcation and Patterns of Reaction-Diffusion Equations., and . Int. J. Bifurc. Chaos, 30 (11): 2050215:1-2050215:10 (2020)Realizability of the normal forms for the non-semisimple 1: 1 resonant Hopf bifurcation in a vector field., , and . Commun. Nonlinear Sci. Numer. Simul., (2020)Stability and bifurcation analysis in a kind of business cycle model with delay, and . Chaos, Solitons & Fractals, 22 (4): 883--896 (November 2004)零知识下的比特流未知协议分类模型 (Unknown Bit-stream Protocol Classification Model with Zero-knowledge)., , , , and . 计算机科学, 43 (8): 39-44 (2016)A Delayed Diffusive Predator-Prey System with Michaelis-Menten Type Predator Harvesting., , and . Int. J. Bifurc. Chaos, 28 (8): 1850099:1-1850099:14 (2018)Stability and bifurcation of a discrete red blood cell survival model, , and . Chaos, Solitons & Fractals, 28 (2): 386--394 (April 2006)Hopf bifurcation in numerical approximation of a n-dimension neural network model with multi-delays, and . Chaos, Solitons & Fractals, 25 (1): 129--146 (July 2005)Cross-domain network attack detection enabled by heterogeneous transfer learning., , , , and . Comput. Networks, (May 2023)A Protocol Vulnerability Analysis Method Based on Logical Attack Graph., , and . IIH-MSP (2), volume 82 of Smart Innovation, Systems and Technologies, page 309-317. Springer, (2017)