Search for persons
X
?
Lecture Notes in Electrical Engineering; Genetic and Evolutionary Computing ,
1
Power Internet of Things Security Evaluation Method Based o..:
, In:
?
2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE) ,
3
FastIoTBot: Identifying IoT Bots by Fast Detecting Anomalou..:
, In:
?
Proceedings of the 2023 2nd International Conference on Networks, Communications and Information Technology ,
4
RRDD: An ATT&CK-based ICS Network Security Risk Assessment ..:
, In:
?
2023 8th International Conference on Intelligent Computing and Signal Processing (ICSP) ,
5
Detecting Anomalous Behaviours Based on System Logs: A Dyna..:
, In:
?
2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS) ,
6
APT Attack Investigation via Fine-grained Sequence Construc..:
, In:
?
Lecture Notes in Electrical Engineering; Genetic and Evolutionary Computing ,
8
Risk Assessment Method of Power Monitoring System Vulnerabi..:
, In:
?
Advances in Intelligent Information Hiding and Multimedia Signal Processing; Smart Innovation, Systems and Technologies ,
9
Research on Evaluation Method of Network Vulnerability in P..:
, In:
?
2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA) ,
10
Ontology and Reinforcement Learning Based Intelligent Agent..:
, In:
?
Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies ,
12