Showing 1 - 6 results of 6 for search 'Xuetao Du' Skip to content
VuFind
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • Čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
    • Galego
    • Tiếng Việt
    • Hrvatski
    • हिंदी
    • Հայերէն
    • Українська
    • Sámegiella
    • Монгол
Advanced
  • Author
  • Xuetao Du
Showing 1 - 6 results of 6 for search 'Xuetao Du', query time: 0.02s Refine Results
  1. 1
    Applications of big data cognitive computing in content security governance

    Applications of big data cognitive computing in content security governance by Xuetao DU

    Published 2021-11-01
    Get full text
    Article
  2. 2
    Behaviour Analysis of Mobile Malicious Software in Network

    Behaviour Analysis of Mobile Malicious Software in Network by Xuetao Du, Ling Chang, Jia Liu, Chen Zhang

    Published 2015-08-01
    Get full text
    Article
  3. 3
    An Effective Method of Monitoring the Large-Scale Traffic Pattern Based on RMT and PCA

    An Effective Method of Monitoring the Large-Scale Traffic Pattern Based on RMT and PCA by Jia Liu, Peng Gao, Jian Yuan, Xuetao Du

    Published 2010-01-01
    Get full text
    Article
  4. 4
    Behaviour Analysis of Mobile Malicious Software in Network

    Behaviour Analysis of Mobile Malicious Software in Network by Xuetao Du, Ling Chang, Jia Liu, Chen Zhang

    Published 2015-08-01
    Get full text
    Article
  5. 5
    Research on Operators Mobile Malware Protection Architecture and Key Technologies

    Research on Operators Mobile Malware Protection Architecture and Key Technologies by Tao Chen, Peng Gao, Xuetao Du, Shan Xue, Manzhi ang

    Published 2014-01-01
    Get full text
    Article
  6. 6
    Research on Operators Mobile Malware Protection Architecture and Key Technologies

    Research on Operators Mobile Malware Protection Architecture and Key Technologies by Tao Chen, Peng Gao, Xuetao Du, Shan Xue, Manzhi ang

    Published 2014-01-01
    Get full text
    Article

Search Tools:

  • RSS Feed
  • Email Search

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs