|1||Jianfeng, Chen||Senior Engineer||Artifical Intelligence, Security Theoryfirstname.lastname@example.org|
|2||Jie, Liu||Senior Engineer||Artifical Intelligence, System Security|
|3||Hui, Yang||Engineer||Artifical Intelligence, Network Security|
|4||Zhi, Sun||Engineer||Artifical Intelligence, Social Security|
|1||Chunlin, Li||Engineer||Proactive Defense, Software Defined Networkemail@example.com|
|2||Xiang, Bai||Senior Engineer||Proactive Defense, Wireless Security|
|3||Qiang, Guo||Engineer||Proactive Defense, Mobile Security|
|4||Minggui, Li||Engineer||Proactive Defense, Security Applications|
|5||Jian, Li||Engineer||Proactive Defense, Mobile Security|
|1||Rui, Xu||Researcher||Network Monitoring, Early Warningfirstname.lastname@example.org|
|2||Fang, Liu||Senior Engineer||Network Monitoring, Early Warningemail@example.com|
|3||Zhiyong, Zhang||Engineer||Network Monitoring, Early Warning|
|4||Jiang, Zhang||Senior Engineer||Network Monitoring, Network Probing|
|5||Ping, Yue||Engineer||Network Monitoring, Big Data Platform|
|6||Mengjun, Duan||Engineer||Network Monitoring, Network Measurement|
|7||Youke, Wu||Engineer||Network Monitoring, Machine Interface|
Please contact us via mail or comments.
Cyberspace Security Technology Key Labortory is a CETC owned scientific and research platform that focus on the state-of-the-art principles and applications of cyberspace security, lead by distinguished chief experts and scientists of domain.
You can find our latest publications and program achievements via Internet and other textual sources.
Copyright © 2017. Cyberspace Security Technology Key Labortory of CETC, All rights reserved.