2008 |
6 | EE | He Guang-Yu,
Wen Ying-You,
Zhao Hong:
SPIT Detection and Prevention Method in VoIP Environment.
ARES 2008: 473-478 |
5 | EE | Liu Mixia,
Zhang Qiuyu,
Zhao Hong,
Yu Dongmei:
Network Security Situation Assessment Based on Data Fusion.
WKDD 2008: 542-545 |
2005 |
4 | EE | Liu Mixia,
Zhang Qiuyu,
Yu Dongmei,
Zhao Hong:
Formal security model research based on Petri-net.
GrC 2005: 575-578 |
2004 |
3 | EE | Shao Hua,
Chang Guiran,
Zhao Hong:
The Consistency between the Attribute Relationships and Time-Serial Count Operators.
CBMS 2004: 529-534 |
1992 |
2 | | Zhao Hong,
Huatian Li:
A Mechanism of Process Group for Application Reliability in Distributed Systems.
Operating Systems Review 26(1): 66-77 (1992) |
1990 |
1 | | Zhao Hong,
Wayne McCoy:
An Associated Object Model for Distributed Systems.
Operating Systems Review 24(4): 34-51 (1990) |