Author of the publication

基于分段模型检测的云服务跨域认证协议的形式化分析与验证 (Cloud Services Cross-domain Authentication Protocol Formal Analysis and Verification Based on Fragment Model Check).

, , and . 计算机科学, 43 (4): 140-144 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks., , , and . KSII Trans. Internet Inf. Syst., 13 (6): 3258-3279 (2019)Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model., , and . Comput. Secur., (February 2024)Mitigating replay attacks with ZigBee solutions., and . Netw. Secur., 2018 (1): 13-19 (2018)Bayesian network based weighted APT attack paths modeling in cloud computing., , and . Future Gener. Comput. Syst., (2019)Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks., , and . TrustCom/BigDataSE/ISPA (1), page 1272-1278. IEEE, (2015)Reasoning crypto ransomware infection vectors with Bayesian networks., , and . ISI, page 149-151. IEEE, (2017)TCSTM: A task-characteristic-considered steady-state thermal model of multicore processors., , , and . Microprocess. Microsystems, (2018)国家电网边缘计算信息系统安全风险评估方法研究 (Research on Security Risk Assessment Method of State Grid Edge Computing Information System)., , , , , and . 计算机科学, 46 (11A): 428-432 (2019)A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation., , , , and . IEEE Access, (2019)Multilabels-Based Scalable Access Control for Big Data Applications., , and . IEEE Cloud Comput., 1 (3): 65-71 (2014)