This work is licensed under the Creative Commons Attribution 4.0 International License.
Qian, Tong. (2022). Resilient decentralized optimization of chance constrained electricity-gas systems over lossy communication networks. Energy, 239, 122158.Search in Google Scholar
Qian, Tong. (2019). Event-triggered updating method in centralized and distributed secondary controls for islanded microgrid restoration. IEEE Transactions on Smart Grid, 11(2), 1387-1395.Search in Google Scholar
Fang, Chunhua. (2021). Mapping Relation of Leakage Currents of Polluted Insulators and Discharge Arc Area. Frontiers in Energy Research, 9, 777230.Search in Google Scholar
Zhou, Wenhai. (2020). Chinese Independent Animation: Renegotiating Identity in Modern China. Springer Nature.Search in Google Scholar
Wang, Hongman. (2020). An algorithm based on markov chain to improve edge cache hit ratio for blockchainenabled IoT. China Communications, 17(9), 66-76.Search in Google Scholar
Fei, Dingzhou. (2019). Stochastic model for emotion contagion in social networks security based on machine learning. Safety science, 118, 757-762.Search in Google Scholar
Afzal, Humaira. (2019). Performance analysis of radio spectrum for cognitive radio wireless networks using discrete time Markov chain. Journal of Systems and Software, 151, 1-7.Search in Google Scholar
Tereikovskiy, Ihor. (2018). Markov model of normal conduct template of computer systems network objects. 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET). IEEE.Search in Google Scholar
Zhang, Tao. (2020). Research on privacy security risk assessment method of mobile commerce based on information entropy and Markov. Wireless Communications and Mobile Computing 2020.Search in Google Scholar
Li, Hui-Jia. (2021). Measuring the network vulnerability based on Markov criticality. ACM Transactions on Knowledge Discovery from Data (TKDD), 16(2), 1-24.Search in Google Scholar
Herath, Hemantha SB, and Tejaswini C. Herath. (2018). Post-audits for managing cyber security investments: Bayesian post-audit using Markov Chain Monte Carlo (MCMC) simulation. Journal of Accounting and Public Policy, 37(6), 545-563.Search in Google Scholar
Li, Qianmu. (2019). Time series association state analysis method for attacks on the smart internet of electric vehicle charging network. Transportation Research Record, 2673(4), 217-228.Search in Google Scholar
Liang, Wei. (2018). A security situation prediction algorithm based on HMM in mobile network. Wireless Communications and Mobile Computing 2018.Search in Google Scholar
Sengan, Sudhakar. (2022). Secured and privacy-based IDS for healthcare systems on E-medical data using machine learning approach. International Journal of Reliable and Quality E-Healthcare (IJRQEH), 11(3), 1-11.Search in Google Scholar
Wang, Zheng. (2022). Learning-Aided Markov Chain Monte Carlo Scheme for Spectrum Sensing in Cognitive Radio. IEEE Transactions on Vehicular Technology.Search in Google Scholar
Wei, Lei. (2022). Application of Bayesian Algorithm in Risk Quantification for Network Security. Computational Intelligence and Neuroscience 2022.Search in Google Scholar
Agajo, James. (2022). Development A Web-Based System for Real Time Prediction of Drought in Northern Nigeria Using Markov Chain Technique. 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development (NIGERCON). IEEE.Search in Google Scholar
Ram, Mahendra. (2019). Enabling green wireless sensor networks: Energy efficient T-MAC using Markov chain based optimization. Electronics, 8(5), 534.Search in Google Scholar
Ugurlu, Omer Faruk, and Mustafa Kumral. (2020). Reliability-based performance analysis of mining drilling operations through Markov chain Monte Carlo and mean reverting process simulations. Simulation, 96(7), 593-604.Search in Google Scholar
Song, Xiaona. (2020). Gain-scheduled finite-time synchronization for reaction–diffusion memristive neural networks subject to inconsistent Markov chains. IEEE Transactions on Neural Networks and Learning Systems, 32(7), 2952-2964.Search in Google Scholar
D’Angelo, Gianni, Massimo Ficco, and Francesco Palmieri. (2021). Association rule-based malware classification using common subsequences of API calls. Applied Soft Computing, 105 107234.Search in Google Scholar
Hoffmann, Romuald. (2019). Markov models of cyber kill chains with iterations. 2019 International Conference on Military Communications and Information Systems (ICMCIS). IEEE.Search in Google Scholar
Fattah, Md, Syed Riad Morshed, and Syed Yad Morshed. (2021) Multi-layer perceptron-Markov chain-based artificial neural network for modelling future land-specific carbon emission pattern and its influences on surface temperature. SN Applied Sciences, 3(3), 1-22.Search in Google Scholar
Tian, Yuan. (2019). A privacy preserving location service for cloud-of-things system. Journal of Parallel and Distributed Computing, 123, 215-222.Search in Google Scholar
Fattah, Md, Syed Riad Morshed, and Syed Yad Morshed. (2021). Multi-layer perceptron-Markov chain-based artificial neural network for modelling future land-specific carbon emission pattern and its influences on surface temperature. SN Applied Sciences, 3(3), 1-22.Search in Google Scholar
Liang, Junwei, and Maode Ma. (2020). ECF-MRS: An efficient and collaborative framework with Markov-based reputation scheme for IDSs in vehicular networks. IEEE transactions on information forensics and security, 16, 278-290.Search in Google Scholar
Tian, Yuan. (2019). A privacy preserving location service for cloud-of-things system. Journal of Parallel and Distributed Computing, 123, 215-222.Search in Google Scholar
Ren, Xin. (2018). A web attack detection technology based on bag of words and hidden Markov model. 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS). IEEE.Search in Google Scholar
Ning, Qian. (2019). Multi-UAVs trajectory and mission cooperative planning based on the Markov model. Physical communication, 35, 100717.Search in Google Scholar
Barakat, Ghena (2022). Modeling and Simulation of IoT Botnet Behaviors Using DEVS. 2022 13th International Conference on Information and Communication Systems (ICICS). IEEE.Search in Google Scholar
Janakiraman, Sengathir, and Bipin Bihari Jayasingh (2019). A hyper-exponential factor-based semi-Markov prediction mechanism for selfish rendezvous nodes in MANETs. Wireless Personal Communications, 108(3), 1493-1511.Search in Google Scholar
Cui, Mengtian, and Yi-Cheng Zhang. (2018). Application of Markov chain approach for multi-attributes dynamic software reliability assessment under both AHP and gray correlation methods. International Journal of Modern Physics C, 29(5), 1840008.Search in Google Scholar
Liu, Chang. (2018). Lafft: Length-aware fft based fingerprinting for encrypted network traffic classification. 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE.Search in Google Scholar
Kandhoul, Nisha, and Sanjay Kumar Dhurandher. (2018). An asymmetric RSA-based security approach for opportunistic IoT. International Conference on Wireless Intelligent and Distributed Environment for Communication. Springer, Cham.Search in Google Scholar
Yao, Zhongjiang. (2020). Encrypted traffic classification based on Gaussian mixture models and Hidden Markov Models. Journal of Network and Computer Applications, 166, 102711.Search in Google Scholar