Open Access
ARTICLE
Lei Hong1, Yiji Qian1,*, Chaofan Gong2, Yurui Zhang1, Xin Zhou3
1 Jiangsu Police Institute, Nanjing, 210000, China
2 Nanjing Police Station, Nanjing, 210000, China
3 System Consulting Pty Ltd., Sydney, 201101, Australia
* Corresponding Author: Yiji Qian. Email:
Computers, Materials & Continua 2023, 74(1), 1887-1903. https://doi.org/10.32604/cmc.2023.029180
Received 27 February 2022; Accepted 01 July 2022; Issue published 22 September 2022
View
Download
Like
KNEMAG: Key Node Estimation Mechanism Based on Attack Graph for IoT Security
Bichen Che, Long Liu, Huali ZhangDetecting Information on the Spread of Dengue on Twitter Using Artificial Neural Networks
Samina Amin, M. Irfan Uddin, M....A Link Analysis Algorithm for Identification of Key Hidden Services
Abdullah Alharbi, Mohd Faizan,...