Author of the publication

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware.

, , , , , , and . IEEE Trans. Dependable Secur. Comput., 11 (4): 361-374 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the controller capacity in software defined networking., , and . ICCCN, page 1-6. IEEE, (2014)Combing Polarization coherence tomography and PoLInSAR segmentation for forest above ground biomass estimation., , , , , , and . IGARSS, page 3351-3354. IEEE, (2012)Identification and quantification of concurrent control chart patterns using extreme-point symmetric mode decomposition and extreme learning machines., , , and . Neurocomputing, (2015)Abadie Constraint Qualifications for Convex Constraint Systems and Applications to Calmness Property., and . J. Optimization Theory and Applications, 174 (2): 388-407 (2017)Fulfillment-Based Fairness: A New Fairness Notion for Multi-AP Wireless Hotspots., and . ICC, page 4791-4796. IEEE, (2007)A Temporarily-spatially Constrained Model Based on TRBAC in Workflow System., , and . CCTA, volume 259 of IFIP Advances in Information and Communication Technology, page 883-889. Springer, (2007)An Efficient Mode Selection Algorithm for H.264., , and . I3E (1), volume 251 of IFIP Advances in Information and Communication Technology, page 346-352. Springer, (2007)Multidimensional Analysis of System Logs in Large-scale Cluster Systems, , and . CoRR, (2009)Phoenix Cloud : Consolidating Heterogeneous Workloads of Large Organizations on Cloud Computing Platforms, , , , , , and . CoRR, (2009)Monitoring Cultural Heritage Sites with Advanced Multi-Temporal InSAR Technique: The Case Study of the Summer Palace., , , and . Remote Sensing, 8 (5): 432 (2016)