您当前的位置:
首页 >
文章列表页 >
Evaluating the network security by the ReadWrite transition model
更新时间:2024-10-14
    • Evaluating the network security by the ReadWrite transition model

    • Vol. 31, Issue 4, Pages: 94-102(2010)
    • CLC: TP393.08
    • Published:2010

    移动端阅览

  • LU Zhi-yong1, 2, FENG Chao1, et al. Evaluating the network security by the ReadWrite transition model[J]. 2010, 31(4): 94-102. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

669

下载量

2

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Risk assessment model based on fuzzy Petri nets
New approach to evaluate the capacity of signature-based intrusion detection systems
Measurement and modeling of the peer-to-peer sharing objects popularity

Related Author

Xiang GAO
Yue-fei ZHU
Sheng-li LIU
Jin-long FEI
Long LIU
SUN Mei-feng1
GONG Jian1
YANG Wang1

Related Institution

State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Information Engineering University
Department of Computer Science and Engineering, Southeast University
College of Information Engineering,Yangzhou University
扬州大学信息工程学院
0