Author of the publication

Toward Ensemble Characterization and Projection of Multistage Cyber Attacks.

, , , and . ICCCN, page 1-8. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing Transition Behaviors in Internet Attack Sequences., and . ICCCN, page 1-6. IEEE, (2011)Who Shall We Follow in Twitter for Cyber Vulnerability?, , , and . SBP, volume 7812 of Lecture Notes in Computer Science, page 394-402. Springer, (2013)An Optimized Resource Allocation and CoMP Based Interference Coordination Scheme for LTE-A Het-Net., , , and . BWCCA, page 207-211. IEEE Computer Society, (2014)An Intra-Cluster CoMP Based Sleep-Mode Scheme in Dense Heterogeneous Network., , , and . IMIS, page 245-249. IEEE Computer Society, (2016)Probabilistic Inference for Obfuscated Network Attack Sequences., and . DSN, page 57-67. IEEE Computer Society, (2014)Interactive Ray Tracing Using a SIMD Reconfigurable Architecture., , , , and . SBAC-PAD, page 20-28. IEEE Computer Society, (2002)Diagnosis of dairy cow diseases by knowledge-driven deep learning based on the text reports of illness state., , , , , , , and . Comput. Electron. Agric., (February 2023)On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite-Ground Integrated Networks., , , , and . Sensors, 23 (11): 5075 (2023)GGPA: A General Graph Processing Architecture with Flexible Execution Paradigm., , , and . CF, page 33-41. ACM, (2023)Research on 6G Satellite-Terrestrial Integrated Network Architecture., , , , , and . ICCSIE, page 1057-1062. ACM, (2022)