Search for persons
X
?
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research ,
3
Has the cyber warfare threat been overstated? : a cheap ..:
, In:
?
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research ,
4
The handicap principle, strategic information warfare and t..:
, In:
?
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies ,
5
Introduction of first passage time (FPT) analysis for softw..:
, In:
?
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies ,
6
An outline of the three-layer survivability analysis archit..:
, In:
?
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems ,
7
Dynamic hybrid fault models and the applications to wireles..:
, In:
?
Proceedings of the 2008 ACM symposium on Applied computing ,
8
Dynamic populations in genetic algorithms:
, In:
?
Digital Forensics and Watermarking; Lecture Notes in Computer Science ,
9
Two-Round Private Set Intersection Mechanism and Algorithm ..:
, In:
?
2023 13th International Conference on Information Science and Technology (ICIST) ,
10
Adaptive Bipartite Consensus of Multi-agent Systems with Co..:
, In:
?
2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA) ,
11
Reactive power optimization for AVC system based on decoupl..:
, In:
?
6th Advanced Forum on Transportation of China (AFTC 2010) ,
12