Showing 1 - 5 results of 5 for search 'Chaoqun Kang' Skip to content
Open Access
  • Home
  • Collections
    • High Impact Articles
    • Jawi Collection
    • Malay Medicine
    • Forensic
  • Search Options
    • UiTM Open Access
    • Search by UiTM Scopus
    • Advanced Search
    • Search by Category
  • Discovery Service
    • Sources
    • UiTM Journals
    • List UiTM Journal in IR
    • Statistic
  • About
    • Open Access
    • Creative Commons Licenses
    • COKI | Malaysia Open Access
    • User Guide
    • Contact Us
    • Search Tips
    • FAQs
Advanced
  • Author
  • Chaoqun Kang
Showing 1 - 5 results of 5 for search 'Chaoqun Kang', query time: 0.05s Refine Results
  1. 1
    Unsupervised Anomaly Detection for Network Data Streams in Industrial Control Systems
    Unsupervised Anomaly Detection for Network Data Streams in Industrial Control Systems
    by Limengwei Liu, Modi Hu, Chaoqun Kang, Xiaoyong Li
    Published 2020-02-01
    Get full text
    Article
  2. 2
    Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing
    Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing
    by Jie Yuan, Erxia Li, Chaoqun Kang, Fangyuan Chang, Xiaoyong Li
    Published 2019-08-01
    Get full text
    Article
  3. 3
    Erratum: Yuan, J. et al. Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing. <i>Information</i> <b>2019</b>, <i>10</i>, 259
    Erratum: Yuan, J. et al. Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing. <i>Information</i> <b>2019</b>, <i>10</i>, 259
    by Jie Yuan, Erxia Li, Chaoqun Kang, Fangyuan Chang, Xiaoyong Li
    Published 2019-10-01
    Get full text
    Article
  4. 4
    Latency-Based Dynamic Controller Assignment in Hybrid SDNs: Considering the Impact of Legacy Routers
    Latency-Based Dynamic Controller Assignment in Hybrid SDNs: Considering the Impact of Legacy Routers
    by Jie Yuan, Erxia Li, Chaoqun Kang, Fangyuan Chang, Tingting Yuan, Xiaoyong Li
    Published 2019-07-01
    Get full text
    Article
  5. 5
    Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees
    Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees
    by Erxia Li, Chaoqun Kang, Deyu Huang, Modi Hu, Fangyuan Chang, Lianjie He, Xiaoyong Li
    Published 2019-07-01
    Get full text
    Article
Search Tools: Get RSS Feed — Email this Search

© 2020 | Services hosted by the Perpustakaan Tun Abdul Razak, | Universiti Teknologi MARA | Disclaimer


Loading...