Author of the publication

WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization.

, , , , , and . J. Comput. Sci. Technol., 23 (2): 222-230 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Quantitative Forecast Method of Network Security Situation Basedon BP Neural Network with Genetic Algorithm., , and . IMSCCS, page 374-380. IEEE Computer Society, (2007)Corrigendum: Placebo Analgesia Changes Alpha Oscillations Induced by Tonic Muscle Pain: EEG Frequency Analysis Including Data during Pain Evaluation., , , , , , , and . Front. Comput. Neurosci., (2016)Placebo Analgesia Changes Alpha Oscillations Induced by Tonic Muscle Pain: EEG Frequency Analysis Including Data during Pain Evaluation., , , , , , , and . Front. Comput. Neurosci., (2016)Network security situation: From awareness to awareness-control., , , , , and . J. Network and Computer Applications, (2019)TIDS: Trust Intrusion Detection System Based on Double Cluster Heads for WSNs., , , and . WASA, volume 11604 of Lecture Notes in Computer Science, page 67-83. Springer, (2019)A Simplified Attack-Defense Game Model for NSSA., , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 820-828. Springer, (2015)Network Security Situation Awareness Based on Heterogeneous Multi-sensor Data Fusion and Neural Network., , , and . IMSCCS, page 352-359. IEEE Computer Society, (2007)Energy-efficient adaptive slice-based secure data aggregation scheme in WSN., , , , and . IIKI, volume 129 of Procedia Computer Science, page 188-193. Elsevier, (2017)WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization., , , , , and . J. Comput. Sci. Technol., 23 (2): 222-230 (2008)An Efficient and Impartial Buyer-Seller Watermarking Protocol., , , and . JCM, 10 (5): 339-344 (2015)