Showing 1 - 20 results of 123 for search 'Bin Xing', query time: 0.05s
Refine Results
-
1
A hierarchy model on the research fields of cyberspace security technology by Bin-xing FANG
Published 2015-12-01
Article -
2
A hierarchy model on the research fields of cyberspace security technology by Bin-xing FANG
Published 2015-12-01
Article -
3
Entropy clustering-based granular classifiers for network intrusion detection by Hui Liu, Gang Hao, Bin Xing
Published 2020-01-01
Article -
4
Target sampling based on routing behavior analysis in network topology measurement by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2009-01-01
Article -
5
Stochastic Approximate Algorithms for Uncertain Constrained <i>K</i>-Means Problem by Jianguang Lu, Juan Tang, Bin Xing, Xianghong Tang
Published 2022-01-01
Article -
6
-
7
Target sampling based on routing behavior analysis in network topology measurement by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2009-01-01
Article -
8
Large scale network worm detection using automatic signature extraction by WANG Ping, FANG Bin-xing, YUN Xiao-chun
Published 2006-01-01
Article -
9
Chinese IP-level network topology measurement and analysis by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2007-01-01
Article -
10
Chinese IP-level network topology measurement and analysis by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2007-01-01
Article -
11
Approach to early detection and defense against internet worms by CHEN Bo, FANG Bin-xing, YUN Xiao-chun
Published 2007-01-01
Article -
12
-
13
-
14
Comprehensive Resilience Assessment of Complex Urban Public Spaces: A Perspective of Promoting Sustainability by Hui Xu, Shuxiu Li, Yongtao Tan, Bin Xing
Published 2022-06-01
Article -
15
Large scale network worm detection using automatic signature extraction by WANG Ping, FANG Bin-xing, YUN Xiao-chun
Published 2006-01-01
Article -
16
Approach to early detection and defense against internet worms by CHEN Bo, FANG Bin-xing, YUN Xiao-chun
Published 2007-01-01
Article -
17
Malignant granular cell tumor in the thoracic wall: A case report by Shengnan Gao, Bin Xing, Bin Xing, Bin Xing, Bin Xing, Sun Lichao, Sun Lichao, Sun Lichao, Sun Lichao, Jie Luo, Jie Luo, Jie Luo, Jie Luo, Jiao Tang, Ye Wang, Ye Wang, Ye Wang, Ye Wang, Ye Wang, Xiaoyan Zhang, Xiaoyan Zhang, Xiaoyan Zhang, Xiaoyan Zhang
Published 2022-09-01
Article -
18
Data privacy preservation for the search of Internet of things based on fine-grained authorization by Jia-hui WANG, Chuan-yi LIU, Bin-xing FANG
Published 2017-01-01
Article -
19
-
20
DDoS attacks detection based on link character by SUN Hong-jie, FANG Bin-xing, ZHANG Hong-li
Published 2007-01-01
Article