Author of the publication

Network security analyzing and modeling based on Petri net and Attack tree for SDN.

, , , , , and . ICNC, page 1-5. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remove Irrelevant Atomic Formulas for Timed Automaton Model Checking., , , and . J. Comput. Sci. Technol., 21 (1): 41-51 (2006)Comparison of trends in the quantity and variety of Science Citation Index (SCI) literature on human pathogens between China and the United States., , , and . Scientometrics, 93 (3): 1019-1027 (2012)The Effect of Checklist in Code Review for Inexperienced Students: An Empirical Study., , , and . CSEE&T, page 120-124. IEEE Computer Society, (2012)Environmental monitoring and air-conditioning automatic control with intelligent building wireless sensor network., , , and . ICARCV, page 2431-2436. IEEE, (2010)A-R Exploit: An Automatic ROP Exploit Based on Long Sequence., , and . SERE (Companion), page 50-56. IEEE, (2014)Performance Model Estimation and Tracking Using Optimal Filters., , and . IEEE Trans. Software Eng., 34 (3): 391-406 (2008)Duration-constrained regular expressions., , , , and . Formal Asp. Comput., 16 (2): 155-163 (2004)Demonstration abstract: applying industrial wireless sensor networks to welder machine system., , , , , and . IPSN, page 319-320. IEEE/ACM, (2014)Fuzzy and Utility Based Network Selection for Heterogeneous Networks in High-Speed Railway., , , and . Wireless Communications and Mobile Computing, (2017)QSAR Analyses of Skin Penetration Enhancers., , , and . Journal of Chemical Information and Modeling, 47 (3): 1130-1149 (2007)