Author of the publication

An Approach for Description of Computer Network Defense Scheme and Its Simulation Verification.

, , , , and . JCP, 9 (2): 388-395 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic Similarity Analysis between High-Level Model Description Text and Low-Level Implementation Text for Network Survivability., , , , and . Web Intelligence, page 694-701. IEEE Computer Society, (2012)A New Type of Self-Adaptive Mechanism for Network Survivability Based on Intrusion Deception., , , and . FGCN (1), page 93-97. IEEE Computer Society, (2008)Static Compliance Checking beyond Separation of Duty Constraints., , , and . 3PGCIC, page 171-178. IEEE Computer Society, (2014)An Evaluation Model of CNO Intelligence Information Confidence., , , , and . WISM, volume 5854 of Lecture Notes in Computer Science, page 400-412. Springer, (2009)Co-segmentation of 3D shapes via multi-view spectral clustering., , , , and . The Visual Computer, 29 (6-8): 587-597 (2013)Design and Implementation of Bus Net Routing Algorithm., , , , and . CIS, page 1474-1478. IEEE Computer Society, (2011)Modeling, conflict detection, and verification of a new virtualization role-based access control framework., , , , and . Security and Communication Networks, 8 (10): 1904-1925 (2015)The Temporal Characteristic of Human Mobility: Modeling and Analysis of Social Worm Propagation., , and . IEEE Communications Letters, 19 (7): 1169-1172 (2015)Static compliance checking beyond separation of duty constraints., , , and . IJES, 10 (5): 423-436 (2018)SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks., , , , , and . IEEE Trans. Dependable Sec. Comput., 16 (1): 142-155 (2019)