Author of the publication

A forensic analysis solution of the email network based on email contents.

, , and . FSKD, page 1613-1619. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New heuristic algorithms for low-energy mapping and routing in 3D NoC., , and . IJCAT, 47 (1): 1-13 (2013)Combining UML Sequence and State Machine Diagrams for Data-Flow Based Integration Testing., , and . ECMFA, volume 7349 of Lecture Notes in Computer Science, page 74-89. Springer, (2012)Analysis of Circular Reinforced Concrete Long Columns Confined with Carbon Fiber Reinforced Plastic Sheets under Small Eccentric Compression., , , , and . IMECS, page 2071-2073. Newswood Limited, (2007)A Research and Application of Continuous Attributes Discretization Based on Cloud Model and Information Entropy., , , , and . FSKD (3), page 34-38. IEEE Computer Society, (2009)A Security Sandbox Approach of Android Based on Hook Mechanism., , , , and . Security and Communication Networks, (2018)Spatial Sampling Strategies for the Effect of Interpolation Accuracy., , , and . ISPRS Int. J. Geo-Information, 4 (4): 2742-2768 (2015)Effects of Lucc Resulting From Tffp Land Usepattern in the Yellow River Delta, China., , , , , , and . CCTA (1), volume 293 of IFIP Advances in Information and Communication Technology, page 431-441. Springer, (2008)A forensic analysis solution of the email network based on email contents., , and . FSKD, page 1613-1619. IEEE, (2015)Cyberspace Situation Prediction Based on Gene Expression Programming., , , , and . ICNC (4), page 191-195. IEEE Computer Society, (2009)An Anonymous Email Identification Solution based on Writing Structural Patterns., , and . Int. J. Grid High Perform. Comput., 7 (2): 37-49 (2015)