Author of the publication

Automatic Generation of Host-Based Network Attack Graph.

, , and . CSIE (1), page 93-98. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sentiment Analysis for Microblog Related to Finance Based on Rules and Classification., , and . BigComp, page 119-126. IEEE Computer Society, (2018)CAPred: A Prediction Model for Timely QoS., , , and . ICWS, page 599-606. IEEE Computer Society, (2015)Design and Implementation of a Multidimensional Data Retrieval Sorting Optimization Model., , and . BigData Congress, page 244-250. IEEE Computer Society, (2016)Automatic Generation of Host-Based Network Attack Graph., , and . CSIE (1), page 93-98. IEEE Computer Society, (2009)Leveraging Contextual Sentences for Text Classification by Using a Neural Attention Model., and . Comp. Int. and Neurosc., (2019)PPQAR: Parallel PSO for quantitative association rule mining., , , and . Peer-to-Peer Networking and Applications, 12 (5): 1433-1444 (2019)Short-Term Subway Passenger Flow Prediction Based on ARIMA., , , and . GSKI (1), volume 848 of Communications in Computer and Information Science, page 464-479. Springer, (2017)Policy Conflict Detection in Composite Web Services with RBAC., , , , and . ICWS, page 534-541. IEEE Computer Society, (2014)Host scurity event track for complex network environments based on the analysis of log., , , and . CCIS, page 807-811. IEEE, (2012)Personalized POI Recommendation Based on Subway Network Features and Users' Historical Behaviors., , and . Wireless Communications and Mobile Computing, (2018)