2007 |
7 | EE | Yang-ming Ma,
Zhitang Li,
Jie Lei,
Li Wang,
Dong Li:
The Global Synthetical Processing of Network Security Events.
FSKD (2) 2007: 492-496 |
6 | EE | Zhitang Li,
Jie Lei,
Li Wang,
Dong Li:
A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction.
FSKD (4) 2007: 307-311 |
5 | EE | Zhitang Li,
Aifang Zhang,
Jie Lei,
Li Wang:
Real-Time Correlation of Network Security Alerts.
ICEBE 2007: 73-80 |
4 | EE | Zhitang Li,
Jie Lei,
Li Wang,
Dong Li,
Yang-ming Ma:
Towards Identifying True Threat from Network Security Data.
PAISI 2007: 160-171 |
3 | EE | Yang-ming Ma,
Zhitang Li,
Jie Lei,
Li Wang,
Dong Li:
An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events.
PAISI 2007: 316-317 |
2 | EE | Li Wang,
Zhitang Li,
Dong Li,
Jie Lei:
Attack scenario construction with a new sequential mining technique.
SNPD (1) 2007: 872-877 |
2006 |
1 | EE | Li Wang,
Zhitang Li,
Jie Lei,
Yao Li:
A novel algorithm SF for mining attack scenarios model.
ICEBE 2006: 55-61 |