Author of the publication

VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory.

, , , and . ICCNS, page 99-108. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

E-WBM: An Effort-Based Vulnerability Discovery Model., , , , and . IEEE Access, (2019)A High-Density EEG Study Investigating the Neural Correlates of Continuity Editing Theory in VR Films., , , , and . Sensors, 23 (13): 5886 (July 2023)A Data Cleaning Service on Massive Spatio-Temporal Data in Highway Domain., , and . ICSOC Workshops, volume 11434 of Lecture Notes in Computer Science, page 229-240. Springer, (2018)DepTaint: A Static Taint Analysis Method Based on Program Dependence., , , , and . ICMSS, page 34-41. ACM, (2020)Fuzzy Adaptive Group Obstacle Avoidance Control for Second-Order Multi-Agent Systems Under Fixed and Switching Topologies., , and . IEEE Trans. Netw. Sci. Eng., 10 (2): 619-630 (March 2023)A Case Study on the Performance of Gazebo with Multi-core CPUs., and . ICIRA (1), volume 10462 of Lecture Notes in Computer Science, page 671-682. Springer, (2017)Accurate Positioning with Single Vision Beacon: A Spatial Geometry Based Algorithm., , , , and . WCSP, page 494-499. IEEE, (2023)Functional Curve Fitting Algorithm via Multi-Heterogeneous Data Curve., , , and . IEEE Access, (2017)A Method of Handling Control Dependence in Dynamic Taint Analysis., , and . CIT/IUCC/DASC/PICom, page 417-422. IEEE, (2015)Multi-pass Training and Cross-information Fusion for Low-resource End-to-end Accented Speech Recognition., , , and . CoRR, (2023)