Showing
1 - 10
results of
10
for search '
Shouhuai Xu
'
Skip to content
Call us: +605 368 8465
Contact us: kmu@utp.edu.my
Toggle navigation
Home
About
Team
Advanced Search
News Blog
Your Account
Log Out
Login
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Shouhuai Xu
Showing
1 - 10
results of
10
for search '
Shouhuai Xu
'
, query time: 0.34s
Refine Results
Results per page
10
20
40
60
80
100
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Human Cognition Through the Lens of Social Engineering Cyberattacks
by
Rosana Montañez
,
Edward Golob
,
Shouhuai
Xu
Published 2020-09-01
Get full text
Article
Save to List
Saved in:
2
CVMan: A Framework for Clone-Incurred Vulnerability Management
by
Jian Shi
,
Deqing Zou
,
Shouhuai
Xu
,
Hai Jin
Published 2023-04-01
Get full text
Article
Save to List
Saved in:
3
A deep learning framework for predicting cyber attacks rates
by
Xing Fang
,
Maochao Xu
,
Shouhuai
Xu
,
Peng Zhao
Published 2019-05-01
Get full text
Article
Save to List
Saved in:
4
Efficient Public Blockchain Client for Lightweight Users
by
Lei Xu
,
Lin Chen
,
Zhimin Gao
,
Shouhuai
Xu
,
Weidong Shi
Published 2018-01-01
Get full text
Article
Save to List
Saved in:
5
IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges
by
Weizhi Meng
,
Javier Lopez
,
Shouhuai
Xu
,
Chunhua Su
,
Rongxing Lu
Published 2021-01-01
Get full text
Article
Save to List
Saved in:
6
Spatiotemporal patterns and predictability of cyberattacks.
by
Yu-Zhong Chen
,
Zi-Gang Huang
,
Shouhuai
Xu
,
Ying-Cheng Lai
Published 2015-01-01
Get full text
Article
Save to List
Saved in:
7
Correction: Spatiotemporal Patterns and Predictability of Cyberattacks.
by
Yu-Zhong Chen
,
Zi-Gang Huang
,
Shouhuai
Xu
,
Ying-Cheng Lai
Published 2015-01-01
Get full text
Article
Save to List
Saved in:
8
Quantifying Privacy Risks for Continuous Trait Data
by
Muqing He
,
Deqing Zou
,
Weizhong Qiang
,
Shouhuai
Xu
,
Wenbo Wu
,
Hai Jin
Published 2022-10-01
Get full text
Article
Save to List
Saved in:
9
Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study
by
Van Trieu-Do
,
Richard Garcia-Lebron
,
Maochao Xu
,
Shouhuai
Xu
,
Yusheng Feng
Published 2020-06-01
Get full text
Article
Save to List
Saved in:
10
Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers /
Published 2014
Call Number:
Loading…
Located:
Loading…
Get full text
Electronic
eBook
Save to List
Saved in:
Search Tools:
RSS Feed
–
Email Search
Related Subjects
Algorithm Analysis and Problem Complexity
Algorithms
Coding and Information Theory
Coding theory
Computer Science
Computer science
Computer security
Data Encryption
Data encryption (Computer science)
Systems and Data Security