Author of the publication

Network Security Situation Prediction Based on BP and RBF Neural Network.

, , , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 659-665. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets., , , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 53-68. Springer, (2013)A Highly Efficient Remote Access Trojan Detection Method., , , and . Int. J. Digit. Crime Forensics, 11 (4): 1-13 (2019)Heterogeneous Distance Learning Based on Kernel Analysis-Synthesis Dictionary for Semi-Supervised Image to Video Person Re-Identification., , , , , , and . IEEE Access, (2020)A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus., , , , , , and . IEEE Access, (2018)Coupled Inductance Model of Full-Bridge Modules in Hybrid High Voltage Direct Current Circuit Breakers., , , , and . IEEE Trans. Ind. Electron., 67 (12): 10315-10324 (2020)Method of Turns Arrangement of Noncircular Rogowski Coil With Rectangular Section., , , , , and . IEEE Trans. Instrum. Meas., (2021)Network Security Situation Prediction Based on BP and RBF Neural Network., , , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 659-665. Springer, (2012)Detecting compromised email accounts via login behavior characterization., , , , , , and . Cybersecur., 6 (1): 36 (December 2023)A Systematic Study of AI Applications in Cybersecurity Competitions., , , , , and . BigDataSE, page 138-146. IEEE, (2020)Sinkhole Attack Detection based on Redundancy Mechanism in Wireless Sensor Networks., , , and . ITQM, volume 31 of Procedia Computer Science, page 711-720. Elsevier, (2014)