Author of the publication

A novel defense model for dynamic topology network based on mobile agent.

, , and . Microprocessors and Microsystems, 29 (6): 289-297 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Address Allocation Scheme Based on Local MAC Address., , and . ICCCS (1), volume 11063 of Lecture Notes in Computer Science, page 263-274. Springer, (2018)Current Attitude Prediction Model Based on Game Theory., , , and . WISE (2), volume 8181 of Lecture Notes in Computer Science, page 469-478. Springer, (2013)An FAR-SW based approach for webpage information extraction., , , and . Information Systems Frontiers, 16 (5): 771-785 (2014)Using the Loopy Belief Propagation in Siguo., , and . ICGA Journal, 30 (4): 209-220 (2007)A Novel Autonomous Trust Management Model for Mobile Agents., , , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 56-65. Springer, (2004)An adaptive adjusting mechanism for agent distributed blackboard architecture., , , and . Microprocessors and Microsystems, 29 (1): 9-20 (2005)The construction of a novel agent fault-tolerant migration model., , , and . ISCC, page 1-6. IEEE Computer Society, (2004)An access control policy for active networks., , , and . ISCC, page 369-374. IEEE Computer Society, (2004)DIMH: A novel model to detect and isolate malicious hosts for mobile ad hoc network., and . Computer Standards & Interfaces, 28 (6): 660-669 (2006)Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet., , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 640-641. Springer, (2005)