Mengmeng Ge

According to our database1, Mengmeng Ge
  • authored at least 14 papers between 2008 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
An Efficient Security System for Mobile Data Monitoring.
Wireless Communications and Mobile Computing, 2018

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities.
Future Generation Comp. Syst., 2018

Automated security investment analysis of dynamic networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
A framework for automating security analysis of the internet of things.
J. Network and Computer Applications, 2017

Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches.
CoRR, 2017

Evaluating the Effectiveness of Security Metrics for Dynamic Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Security Modeling and Analysis of Cross-Protocol IoT Devices.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

2016
Survey on key revocation mechanisms in wireless sensor networks.
J. Network and Computer Applications, 2016

Security Modelling and Analysis of Dynamic Enterprise Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
A Framework for Modeling and Assessing Security of the Internet of Things.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

2014
A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2008
Application and Practice of System Integration Approach in Intelligent Human Motion Recognition.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...