The following publications are possibly variants of this publication:
- A Game Theoretical Attack-Defense Model Oriented to Network Security Risk AssessmentWei He, Chunhe Xia, Haiquan Wang, Cheng Zhang, Yi Ji. csse 2008: 498-504 [doi]
- Audio-Based Security Techniques for Secure Device-to-Device CommunicationsDajiang Chen, Ning Zhang 0007, Huici Wu, Kuan Zhang 0001, Rongxing Lu, Mohsen Guizani. network, 36(6):54-59, 2022. [doi]
- Everyone-Centric Heterogeneous Multi-Server Computation Offloading in ITS with Pervasive AIXiaoqin Song, Bowen Xu, Xinting Zhang, Shumo Wang, Tiecheng Song, Guoliang Xing, Fang Liu. network, 37(2):62-68, March / April 2023. [doi]
- Deep Learning for Security Problems in 5G Heterogeneous NetworksZhihan Lv, Amit Kumar Singh 0001, Jinhua Li. network, 35(2):67-73, 2021. [doi]