2008 |
19 | EE | Lei Hou,
Hai-Xin Duan,
Jianping Wu:
Scheduling Peers Based on Credit Construction Period in Peer-to-Peer Networks.
ICPADS 2008: 470-477 |
18 | EE | Yuan Liang,
Hai-Xin Duan:
An Admission Control Policy Based on Social Networks for P2P Systems.
WAIM 2008: 487-492 |
17 | EE | Jia Zhang,
Yuntao Guan,
Xiaoxin Jiang,
Hai-Xin Duan,
Jianping Wu:
AMCAS: An Automatic Malicious Code Analysis System.
WAIM 2008: 501-507 |
16 | EE | Hong Zhang,
Hai-Xin Duan,
Wu Liu:
RRM: An incentive reputation model for promoting good behaviors in distributed systems.
Science in China Series F: Information Sciences 51(11): 1871-1882 (2008) |
15 | EE | Lanjia Wang,
Hai-Xin Duan,
Xing Li:
Dynamic emulation based modeling and detection of polymorphic shellcode at the network level.
Science in China Series F: Information Sciences 51(11): 1883-1897 (2008) |
2005 |
14 | EE | Hong Zhang,
Hai-Xin Duan,
Wu Liu,
Jianping Wu:
An Extensible AAA Infrastructure for IPv6.
CIS (2) 2005: 482-487 |
13 | EE | Wu Liu,
Hai-Xin Duan,
Jianping Wu,
Xing Li:
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems.
CIS (2) 2005: 518-525 |
12 | EE | Wu Liu,
Jianping Wu,
Hai-Xin Duan,
Xing Li:
New Algorithm Mining Intrusion Patterns.
FSKD (2) 2005: 774-777 |
11 | EE | Wu Liu,
Jianping Wu,
Hai-Xin Duan,
Xing Li:
New Method for Intrusion Features Mining in IDS.
ICIC (1) 2005: 429-437 |
10 | EE | Lanjia Wang,
Hai-Xin Duan,
Xing Li:
Port Scan Behavior Diagnosis by Clustering.
ICICS 2005: 243-255 |
9 | EE | Wu Liu,
Jianping Wu,
Hai-Xin Duan,
Xing Li:
The Authorization Service in Dynamic Trust Domains.
ICITA (2) 2005: 564-567 |
8 | EE | Wu Liu,
Hai-Xin Duan,
Jianping Wu,
Xing Li:
Improved Marking Model ERPPM Tracing Back to DDoS Attacker.
ICITA (2) 2005: 759-762 |
7 | EE | Hanghang Tong,
Chongrong Li,
Jingrui He,
Jiajian Chen,
Quang-Anh Tran,
Hai-Xin Duan,
Xing Li:
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier.
ISNN (3) 2005: 476-481 |
6 | EE | Quang-Anh Tran,
Xing Li,
Hai-Xin Duan:
Efficient performance estimate for one-class support vector machine.
Pattern Recognition Letters 26(8): 1174-1182 (2005) |
2004 |
5 | EE | Wu Liu,
Jianping Wu,
Hai-Xin Duan,
Xing Li,
Ping Ren:
XML Based X.509 Authorization in CERNET Grid.
GCC 2004: 325-332 |
4 | EE | Wu Liu,
Hai-Xin Duan,
Jianping Wu,
Xing Li,
Ping Ren:
Algorithms for Congestion Detection and Control.
GCC Workshops 2004: 374-381 |
3 | | Wu Liu,
Hai-Xin Duan,
Yong Feng,
Yong-Bin Li,
Ping Ren:
Improved algorithms tracing back to attacking sources.
Parallel and Distributed Computing and Networks 2004: 222-226 |
2 | | Jiahai Yang,
Hai-Xin Duan,
Jianping Wu,
Xing Li:
Workflow Oriented Network Management - A Web/Java Approach.
J. Network Syst. Manage. 12(4): (2004) |
2003 |
1 | EE | Wu Liu,
Hai-Xin Duan,
Jianping Wu,
Ping Ren,
Li-Hua Lu:
Distributed IDS Tracing Back to Attacking Sources.
GCC (1) 2003: 859-866 |