![]() |
| 2006 | ||
|---|---|---|
| 3 | EE | Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham: On Recognizing Virtual Honeypots and Countermeasures. DASC 2006: 211-218 |
| 2 | EE | Dan Cheng, Zhibin Mai, Jianjia Wu, Guan Qin, Wei Zhao: A Service-Oriented Integrating Practice for Data Modeling, Analysis and Visualization. ICEBE 2006: 631-638 |
| 2004 | ||
| 1 | Jianjia Wu, Dan Cheng, Wei Zhao: Detecting Grid-Abuse Attacks by Source-based Monitoring. ISCA PDCS 2004: 565-571 | |
| 1 | Xinwen Fu | [3] |
| 2 | Steve Graham | [3] |
| 3 | Zhibin Mai | [2] |
| 4 | Guan Qin | [2] |
| 5 | Kevin Streff | [3] |
| 6 | Xuejun Tan | [3] |
| 7 | Jianjia Wu | [1] [2] |
| 8 | Wei Yu | [3] |
| 9 | Wei Zhao | [1] [2] |