Secure and Temporary Access Delegation With Equality Test for Cloud-Assisted IoV | 0 | 0.34 | 2022 |
FedHGCDroid: An Adaptive Multi-Dimensional Federated Learning for Privacy-Preserving Android Malware Classification | 0 | 0.34 | 2022 |
Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation | 0 | 0.34 | 2022 |
HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis | 0 | 0.34 | 2021 |
A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service. | 0 | 0.34 | 2020 |
An Information Source Identification Algorithm Based on Shortest Arborescence of Network | 0 | 0.34 | 2019 |
Feature Generation: A Novel Intrusion Detection Model Based On Prototypical Network | 0 | 0.34 | 2019 |
A Novel Intrusion Detector Based on Deep Learning Hybrid Methods | 1 | 0.36 | 2019 |
Which Node Properties Identify The Propagation Source In Networks? | 0 | 0.34 | 2019 |
Topic Reconstruction: A Novel Method Based On Lda Oriented To Intrusion Detection | 0 | 0.34 | 2019 |
H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices | 0 | 0.34 | 2018 |
Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications. | 0 | 0.34 | 2018 |
On the satisfiability of authorization requirements in business process. | 0 | 0.34 | 2017 |
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms. | 1 | 0.36 | 2017 |
A Dynamic Placement Policy Of Virtual Machine Based On Moga In Cloud Environment | 0 | 0.34 | 2017 |
An Attack-Oriented Task Execution Collaborative Defense Protocol | 0 | 0.34 | 2017 |
CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud | 0 | 0.34 | 2017 |
The Temporal Characteristic of Human Mobility: Modeling and Analysis of Social Worm Propagation | 1 | 0.35 | 2015 |
A Method of Network Security Situation Assessment Based on Hidden Markov Model. | 1 | 0.36 | 2015 |
An Interval Algebra-based Modeling and Routing Method in Bus Delay Tolerant Network | 1 | 0.36 | 2015 |
Modeling, conflict detection, and verification of a new virtualization role‐based access control framework | 0 | 0.34 | 2015 |
Static Compliance Checking beyond Separation of Duty Constraints | 1 | 0.35 | 2014 |
Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage. | 0 | 0.34 | 2014 |
An automated method of penetration testing | 0 | 0.34 | 2014 |
An Approach For Description Of Computer Network Defense Scheme And Its Simulation Verification | 1 | 0.35 | 2014 |
Coordinated Scan Detection Algorithm Based on the Global Characteristics of Time Sequence | 0 | 0.34 | 2014 |
Co-segmentation of 3D shapes via multi-view spectral clustering | 9 | 0.45 | 2013 |
A Computer Network Defense Policy Refinement Method | 0 | 0.34 | 2013 |
A Conflict-Related Rules Detection Tool for Access Control Policy | 1 | 0.36 | 2013 |
A Verification Method of Enterprise Network Reachability Based on Topology Path | 0 | 0.34 | 2013 |
Optimal Service Selection Based on Business for Cloud Computing | 1 | 0.35 | 2013 |
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach | 0 | 0.34 | 2013 |
On the Spatial-temporal Reachability of DTNs | 0 | 0.34 | 2013 |
A Botnet-Oriented Collaborative Defense Scheme Description Language | 0 | 0.34 | 2013 |
On the distribution of inter contact time for DTNs | 3 | 0.40 | 2012 |
Characterization and modeling in large-scale urban DTNs | 13 | 0.59 | 2012 |
Design and Implementation of Bus Net Routing Algorithm | 1 | 0.37 | 2011 |
Application for Artificial Bee Colony Algorithm in Migration of Mobile Agent | 2 | 0.39 | 2010 |
A tactical intelligence production model of computer network self-organizing operations | 0 | 0.34 | 2010 |
A Bulk Email Oriented Multi-party Non-repudiation Exchange Protocol | 0 | 0.34 | 2009 |
Research on Survivability of Mobile Ad Hoc Network | 0 | 0.34 | 2009 |
An Evaluation Model of CNO Intelligence Information Confidence | 1 | 0.43 | 2009 |
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment | 14 | 0.84 | 2008 |
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment | 1 | 0.40 | 2008 |
A Network Security Risk Assessment Framework Based on Game Theory | 7 | 0.57 | 2008 |
A New Type of Self-Adaptive Mechanism for Network Survivability Based on Intrusion Deception | 0 | 0.34 | 2008 |
Research on Simulation Framework of Structured P2P Network | 2 | 0.49 | 2007 |
P2P worm detection based on application identification | 1 | 0.37 | 2007 |
Non-repudiation protocol for E-mail and its formal analysis | 0 | 0.34 | 2006 |