Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

Biblio

Export 1 results:
  • RTF
  • EndNote XML
Filters: Author is Zhu Sanyuan  [Clear All Filters]
2022
Zenggang, Xiong, Zeng Mingyang, Zhang Xuemin, Zhu Sanyuan, Xu Fang, Zhao Xiaochao, Wu Yunyun, and Li Xiang. "Social Similarity Routing Algorithm based on Socially Aware Networks in the Big Data Environment ." Journal of Signal Processing Systems (2022).
  • Google Scholar
  • RTF
  • EndNote XML
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
  • Cybersecurity
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

Cybersecurity Threats and Challenges. International Best Practices

read more >>

Conference on Cybersecurity and Resilience

read more >>

Study on 2035 scenarios on defence resource allocation

read more >>

Contribution to the Inter-Parliamentary Conference on CFSP and CSDP

read more >>

Vol. 29 of I&S on Scenario-based Security Foresight is available online

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT, 2010 -