Author of the publication

Detection and Defense Methods of Cyber Attacks.

, , , and . MDATA: A New Knowledge Representation Model, volume 12647 of Lecture Notes in Computer Science, Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synergistic partitioning in multiple large scale social networks., , , , and . IEEE BigData, page 281-290. IEEE Computer Society, (2014)Introduction to the MDATA Model., , , and . MDATA: A New Knowledge Representation Model, volume 12647 of Lecture Notes in Computer Science, Springer, (2021)Identifying Users Based on Behavioral-Modeling across Social Media Sites., , , and . APWeb, volume 8709 of Lecture Notes in Computer Science, page 48-55. Springer, (2014)General Spatial Skyline Operator., , , and . DASFAA (1), volume 7238 of Lecture Notes in Computer Science, page 494-508. Springer, (2012)Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors., , , , , and . DSC, page 1-7. IEEE, (2020)Higher Vocational Students' Innovation and Entrepreneurship Ability Demand Prediction., , , , , and . Int. J. Emerg. Technol. Learn., 18 (8): 196-209 (April 2023)Economic production quantity model research based on facility layout planning., , and . EMEIT, page 604-608. IEEE, (2011)Multiple Sequential Network Attacks Detection Based on DTW-HMM., , , , , and . DSC, page 134-141. IEEE, (2022)The Sampling Synchronization of the Chaotic System with Different Structures Based on T-S Model., , , and . WISM, volume 5854 of Lecture Notes in Computer Science, page 186-194. Springer, (2009)A Framework to Construct Knowledge Base for Cyber Security., , , and . DSC, page 242-248. IEEE Computer Society, (2017)