Author of the publication

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation -M(1, 2, 3).

, and . J. Networks, 4 (5): 324-331 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating an Engaged Workforce., and . Communication Research, 44 (2): 225-243 (2017)A Novel Method of Pseudorandom Sequence Design Based on Hyperchaos System., and . IMECS, page 1337-1340. Newswood Limited, (2007)Detection and Analysis of Water Army Groups on Virtual Community., , , , , , and . NCCET, volume 592 of Communications in Computer and Information Science, page 105-117. Springer, (2015)Binary counting with chemical reactions., , , and . Pacific Symposium on Biocomputing. Pacific Symposium on Biocomputing, (2011)Joint Integer-Forcing Precoder Design for MIMO Multiuser Relay System., , , , and . IEEE Access, (2019)Binary Counting with Chemical Reactions., , and . Pacific Symposium on Biocomputing, page 302-313. World Scientific Publishing, (2011)A distributed key management scheme based on SGC-PKC for P2P network., , , and . WCNIS, page 491-495. IEEE, (2010)Semi-Supervised Nonparametric Discriminant Analysis., , and . IEICE Trans. Inf. Syst., 96-D (2): 375-378 (2013)Intermittent Fault Diagnosability of Hyper Petersen Network., and . Int. J. Wirel. Inf. Networks, 25 (3): 332-339 (2018)Weighted double-backtracking matching pursuit for block-sparse reconstruction., , and . IET Signal Process., 10 (8): 930-935 (2016)