Search

Your search keyword '"Yingxu Lai"' showing total 27 results

Search Constraints

Start Over You searched for: Author "Yingxu Lai" Remove constraint Author: "Yingxu Lai" Topic computer Remove constraint Topic: computer
27 results on '"Yingxu Lai"'

Search Results

1. Cross-heterogeneous Domain Authentication Scheme Based on Blockchain

2. Explaining the Attributes of a Deep Learning Based Intrusion Detection System for Industrial Control Networks

3. A trusted access method in software-defined network

4. Vulnerability mining for Modbus TCP based on exception field positioning

5. Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network

6. Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model

7. Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer

8. Design and analysis on trusted network equipment access authentication protocol

9. Software Abnormal Behavior Detection Based on Function Semantic Tree

10. On monitoring and predicting mobile network traffic abnormality

11. FL-GUARD

12. Keyword extraction by entropy difference between the intrinsic and extrinsic mode

13. A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System

14. Short Text Sentiment Classification Based on Context Reconstruction

15. Research on User Permission Isolation for Multi-Users Service-Oriented Program

16. Study on Authentication Protocol of SDN Trusted Domain

17. Software behaviour analysis method based on behaviour template

18. Trust-Based Security for the Spanning Tree Protocol

19. An Efficient LKH Tree Balancing Algorithm for Group Key Management

20. Framework of Web content filtering for IPv6

21. A Data Mining Framework for Building Intrusion Detection Models Based on IPv6

22. Design and Implementation of Distributed Intelligent Firewall Based on IPv6

23. Design and Implementation of Distributed Firewall System for IPv6

24. Trusted Computing Based Mobile DRM Authentication Scheme

25. Unknown Malicious Executable Defection

26. A Feature Selection for Malicious Detection

27. Unknown Malicious Code Detection Based on Bayesian

Catalog

Books, media, physical & digital resources