Author of the publication

Research on co-operative computer network security technologies.

, , and . SMC (2), page 1164-1168. IEEE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A spatial layout method based on feature encoding and GA-BiLSTM., and . RCVE, page 65-70. ACM, (2023)LQ Control during Clutch Engagement for Automatic Transmissions., , , and . ACC, page 490-495. IEEE, (2018)Neural Network Based Flow Forecast and Diagnosis., , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 542-547. Springer, (2005)Probing Local Cellular Mechanics by Atomic Force Microscopy with Modified Spherical Tip., , , , , , , and . CBS, page 306-310. IEEE, (2023)Baseline - A Passive Approach to Tolerate and Detect DoS/DDoS Attacks., , and . Security and Management, page 104-110. CSREA Press, (2005)An Energy-efficient and Real-time Anonymous Routing Protocol for Ad hoc Networks., , and . J. Comput., 7 (4): 900-912 (2012)The impact factors on the performance of machine learning-based vulnerability detection: A comparative study., , , , , , and . J. Syst. Softw., (2020)A symmetric cryptography based on extended cellular automata., , , and . SMC, page 499-503. IEEE, (2005)Proactive maintenance with variant workload under Distributed Multimedia Application Systems., , and . CSCWD, page 1441-1443. IEEE, (2006)Model and analysis of path compression for mobile Ad Hoc networks., , , and . Comput. Electr. Eng., 36 (3): 442-454 (2010)