Showing 1 - 2 results of 2 for search 'Yan-jing HU', query time: 0.01s
Refine Results
-
1
Mining and utilization of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI
Published 2017-10-01
Article -
2
Clustering perception mining of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI
Published 2017-06-01
Article