Author of the publication

A Vulnerability Attack Graph Generation Method Based on Scripts.

, , , and . ICICA (LNCS), volume 7473 of Lecture Notes in Computer Science, page 45-50. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and Application of Reinforcement Learning Based on Constraint MDP in Coal Mine., , , and . CSIE (4), page 687-691. IEEE Computer Society, (2009)Research of Coal Mine Safety-Production Dispatching Based on Multilayer Petri Net., and . FSKD (2), page 332-337. IEEE Computer Society, (2009)Typing Technology of Virtual Character of Animation Based on Enneagram Personality., , and . Trans. Edutainment, (2019)Lip-Reading Based on Deep Learning Model., , and . Trans. Edutainment, (2019)A novel approach to building collapse detection from post-seismic polarimetric SAR imagery by using optimization of polarimetric contrast enhancement., , , and . IGARSS, page 3270-3273. IEEE, (2015)Dynamic spectrum allocation under cognitive cell network for M2M applications., , , , , , and . ACSCC, page 596-600. IEEE, (2012)A novel digital controller for boost PFC converter with high power factor and fast dynamic response., , , , and . ASICON, page 1-4. IEEE, (2013)A Synchronization Aware Memory Race Recorder., , , , and . ICPADS, page 540-547. IEEE Computer Society, (2012)Speech Codec Optimization Based on Cell Broadband Engine., , , and . ICASSP (2), page 805-808. IEEE, (2007)Reconstructing scene depth and appearance behind foreground occlusion using camera array., , , and . ICIP, page 41-45. IEEE, (2014)