Author of the publication

The Research on Security Audit for Information System Classified Protection.

, , , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 300-308. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets., , , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 53-68. Springer, (2013)A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus., , , , , , and . IEEE Access, (2018)Network Security Situation Prediction Based on BP and RBF Neural Network., , , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 659-665. Springer, (2012)Heterogeneous Distance Learning Based on Kernel Analysis-Synthesis Dictionary for Semi-Supervised Image to Video Person Re-Identification., , , , , , and . IEEE Access, (2020)Coupled Inductance Model of Full-Bridge Modules in Hybrid High Voltage Direct Current Circuit Breakers., , , , and . IEEE Trans. Ind. Electron., 67 (12): 10315-10324 (2020)Method of Turns Arrangement of Noncircular Rogowski Coil With Rectangular Section., , , , , and . IEEE Trans. Instrum. Meas., (2021)A novel learning framework for vocal music education: an exploration of convolutional neural networks and pluralistic learning approaches., and . Soft Comput., 28 (4): 3533-3553 (February 2024)Detecting compromised email accounts via login behavior characterization., , , , , , and . Cybersecur., 6 (1): 36 (December 2023)A Highly Efficient Remote Access Trojan Detection Method., , , and . Int. J. Digit. Crime Forensics, 11 (4): 1-13 (2019)A Systematic Study of AI Applications in Cybersecurity Competitions., , , , , and . BigDataSE, page 138-146. IEEE, (2020)