Author of the publication

Dynamical Network Forensics Based on Immune Agent.

, , , , and . ICNC (3), page 651-656. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental Study of Disruption-Tolerant Transport Protocol for Mobile Ad-Hoc Networks with Connection Diversity., , , and . Trustcom/BigDataSE/ISPA, page 1613-1620. IEEE, (2016)Orbital Degeneracy and the Microscopic Model of the FeAs Plane in the Iron-Based Superconductors. arXiv.org:0804.0536. (2008)Exact discovery of the most interesting sequential patterns., , and . CoRR, (2015)A novel low-cost interface design for SystemC and SystemVerilog Co-simulation., , , , and . ASICON, page 1-4. IEEE, (2015)Molecular doping enabled scalable blading of efficient hole-transport-layer-free perovskite solar cells, , , , , , , , , and 2 other author(s). Nature Communications, 9 (1): 1625-- (2018)Security Region Analysis with Artificial Noise Based on Secrecy Outage Probability., , , , and . MILCOM, page 336-340. IEEE, (2018)Preliminary Coherence Assessment of Gaofen-3 SAR Data., , , , , and . IGARSS, page 2172-2175. IEEE, (2018)Competition and Cooperation in Analog Neural Networks for Combinatorial Optimization (Abstract)., and . ACM Conference on Computer Science, page 444. ACM, (1990)A New Distributed Data Mining Model Based on Similarity., , and . SAC, page 432-436. ACM, (2003)Scheduling Tasks with Mixed Timing Constraints in GPU-Powered Real-Time Systems., , , , , , and . ICS, page 30:1-30:13. ACM, (2016)