Jihong Han

According to our database1, Jihong Han authored at least 11 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Active Defense Strategy Selection Method Based on Two-Way Signaling Game.
Secur. Commun. Networks, 2019

OCFSII: A New Feature Selection Based on Orthogonal Centroid both Inter-class and Intra-class for Vulnerability Classification.
Int. J. Netw. Secur., 2019

2016
基于非合作博弈攻击预测的防御策略选取方法 (Defense Strategies Selection Method Based on Non-cooperative Game Attack Forecast).
计算机科学, 2016

基于智能优化算法的模糊软子空间聚类方法 (Fuzzy Soft Subspace Clustering Method Based on Intelligent Optimization Algorithm).
计算机科学, 2016

2015
基于Map-Reduce模型的云资源调度方法研究 (Research on Cloud Resource Scheduling Method Based on Map-Reduce).
计算机科学, 2015

云计算环境中服务动态选择算法研究 (Research on Service Dynamic Selection Algorithm in Cloud Computing).
计算机科学, 2015

2012
A Novel Method for Modeling Complex Network of Software System Security.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2009
Automatic Verification for Secrecy of Cryptographic Protocols in First-Order Logic.
Int. J. Distributed Sens. Networks, 2009

A Security Architecture for Tactical Mobile Ad Hoc Networks.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

2008
Identity-Based Threshold Key Management for Ad Hoc Networks.
Proceedings of the PACIIA 2008, 2008

Analysis of Distributed CA Model for MANETs Based on Queuing Theory.
Proceedings of the PACIIA 2008, 2008


  Loading...