| 2008 |
| 6 | EE | He Guang-Yu,
Wen Ying-You,
Zhao Hong:
SPIT Detection and Prevention Method in VoIP Environment.
ARES 2008: 473-478 |
| 5 | EE | Liu Mixia,
Zhang Qiuyu,
Zhao Hong,
Yu Dongmei:
Network Security Situation Assessment Based on Data Fusion.
WKDD 2008: 542-545 |
| 2005 |
| 4 | EE | Liu Mixia,
Zhang Qiuyu,
Yu Dongmei,
Zhao Hong:
Formal security model research based on Petri-net.
GrC 2005: 575-578 |
| 2004 |
| 3 | EE | Shao Hua,
Chang Guiran,
Zhao Hong:
The Consistency between the Attribute Relationships and Time-Serial Count Operators.
CBMS 2004: 529-534 |
| 1992 |
| 2 | | Zhao Hong,
Huatian Li:
A Mechanism of Process Group for Application Reliability in Distributed Systems.
Operating Systems Review 26(1): 66-77 (1992) |
| 1990 |
| 1 | | Zhao Hong,
Wayne McCoy:
An Associated Object Model for Distributed Systems.
Operating Systems Review 24(4): 34-51 (1990) |