Tianfield, Huaglory
9  results:
Search for persons X
?
1

A Reinforcement Learning Approach for Attack Graph Analysis:

, In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE),
Yousefi, Mehdi ; Mtetwa, Nhamo ; Zhang, Yan. - p. 212-217 , 2018
 
?
2

Glowworm swarm optimisation based task scheduling for cloud..:

, In: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing,
 
?
3

Glowworm Swarm Optimisation for Training Multi-Layer Percep..:

, In: Proceedings of the Fourth IEEE/ACM International Conference on Big Data Computing, Applications and Technologies,
 
?
4

A big data analytics based approach to anomaly detection:

, In: Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies,
 
?
5

Energy-Aware Virtual Machine Consolidation for Cloud Data C..:

, In: Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing,
 
?
6

Virtual Machine Introspection:

, In: Proceedings of the 7th International Conference on Security of Information and Networks,
Win, Thu Yein ; Tianfield, Huaglory ; Mair, Quentin.. - p. 405-410 , 2014
 
?
7

Virtualization Security Combining Mandatory Access Control ..:

, In: Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing,
Win, Thu Yein ; Tianfield, Huaglory ; Mair, Quentin - p. 1004-1009 , 2014
 
?
8

Intrusion Detection System for Cloud Environment:

, In: Proceedings of the 7th International Conference on Security of Information and Networks,
Baraka, Hifaa Bait ; Tianfield, Huaglory - p. 399-404 , 2014
 
?
9

Enterprise Federation and Its Multi-agent Modelization:

, In: E-Commerce Agents; Lecture Notes in Computer Science,
Tianfield, Huaglory - p. 295-322 ,
 
1-9