The following publications are possibly variants of this publication:
- A Mapping Scheme of Users to SCMA Layers for D2D CommunicationsYanping Liu, Xuming Fang, Huali Yang, Xi Li, Qi Xiao, Shuangshuang An, Yan Luo, Dageng Chen. vtc 2016: 1-5 [doi]
- A Behavior Sequence Clustering-Based Enterprise Network Anomaly Host Recognition MethodJing Tao, Ning Zheng, Waner Wang, Ting Han, Xuna Zhan, Qingxin Luan. icbk 2019: 236-241 [doi]
- Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networksZonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Youki Kadobayashi. compsec, 30(6-7):525-537, 2011. [doi]