共 50 条
- [41] Network security risk analysis based on graph theoretical methods [J]. Sixth Wuhan International Conference on E-Business, Vols 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 510 - 516
- [42] Complex Network Security Analysis based on Attack Graph Model [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
- [43] Glotto Vibrato Graph: A Device and Method for Recording, Analysis and Visualization of Glottal Activity [J]. 19TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2018), VOLS 1-6: SPEECH RESEARCH FOR EMERGING MARKETS IN MULTILINGUAL SOCIETIES, 2018, : 2392 - 2393
- [45] A security analysis for encrypted database [J]. 2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 987 - 990
- [46] Bibliometric-based Visualization Knowledge Graph Analysis of Smart Factory [J]. INTERNATIONAL CONFERENCE ON MECHANICAL DESIGN AND SIMULATION (MDS 2022), 2022, 12261
- [47] Visualization and Forecast Analysis of Science and Technology Intelligence Based on Knowledge Graph [J]. 2018 17TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS ENGINEERING AND SCIENCE (DCABES), 2018, : 44 - 47
- [48] Homomorphic Encryption atWork for Private Analysis of Security Logs [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 515 - 523
- [49] Speeding Up Bipartite Graph Visualization Method [J]. AI 2011: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2011, 7106 : 697 - +
- [50] Simulation system for fin-and-tube heat exchanger based on graph theory, database and visualization technology [J]. PROCEEDINGS OF THE 3RD ASIAN CONFERENCE ON REFRIGERATION AND AIR-CONDITIONING VOLS I AND II, 2006, : 153 - +