Author of the publication

Network Security Risk Assessment Based on Item Response Theory.

, , , and . ICST Trans. Security Safety, 2 (5): e5 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Interference Cancellation Scheme for Device-to-Device Communication Underlaying Cellular Networks., , , , and . VTC Fall, page 1-5. IEEE, (2010)Joint Resource Allocation for Multi-User and Two-Way Multi-Relay OFDMA Networks., , , , and . VTC Spring, page 1-5. IEEE, (2014)Analytical and simulation modeling of a multi-server queue with Markovian arrivals and priority services., and . Simulation Modelling Practice and Theory, (2012)Uplink transceiver for subcarrier index modulation OFDM in massive MIMO systems with imperfect channel state information., , , and . WCSP, page 1-6. IEEE, (2016)Network Security Risk Assessment Based on Item Response Theory., , , and . ICST Trans. Security Safety, 2 (5): e5 (2015)Robust extraction for low-contrast liver tumors using modified adaptive likelihood estimation., , , and . Int. J. Comput. Assist. Radiol. Surg., 13 (10): 1565-1578 (2018)Improving Bridge Deterioration Modelling Using Rainfall Data from the Bureau of Meteorology., , and . AusDM, volume 168 of CRPIT, page 161-167. Australian Computer Society, (2015)C-V2X Supported Automated Driving., , , , , and . ICC Workshops, page 1-5. IEEE, (2019)An improved framework of distributed video codec., , , and . ICT, page 493-498. IEEE, (2011)Deep learning the semantics of change sequences for query expansion., , and . Softw., Pract. Exper., 49 (11): 1600-1617 (2019)