Skip to main content
Science of Security Virtual Organization

Header Menu

  • Research
    • Virtual Institutes
    • Lablets
    • Projects
    • Publications
  • Competitions
    • Cybersecurity Paper Competition
    • ISEF
  • Meetings
    • HotSoS Symposium
    • HCSS Conference
    • C3E Workshop
    • SCC Meeting
Not a member? Forgot your password?

Hamburger Menu

  • Home
  • Projects
  • News
  • Events

Breadcrumb

  • Home /
  • Shuai Li
First name
Shuai
Last name
Li
Li, S., Wang, T., Ma, J., & Zhao, W. (2023). A three-party attack-defense deception game model based on evolutionary. In (p. 51—56). IEEE. http://doi.org/10.1109/ICCECE58074.2023.10135374 (Original work published 2025)
View
Dang, F., Yan, L., Li, S., & Li, D. (2022). Trusted Dynamic Threshold Caculation Method in Power IoT. In 2022 14th International Conference on Communication Software and Networks (ICCSN) (pp. 19–22).
View
© 2025 Science of Security Virtual Organization

Footer

  • Terms
  • Follow Us on X