2008 | ||
---|---|---|
33 | EE | Chuiwei Lu, Zhitang Li, Huaiqin Lin, Qingfeng Huang: Fault-Tolerant Routing for P2P System with Structured Topology. CSSE (3) 2008: 102-105 |
32 | EE | Hao Tu, Zhitang Li, Bin Liu: Mining Network Traffic for Worm Signature Extraction. FSKD (4) 2008: 327-331 |
31 | EE | Jie Ma, Zhitang Li, Weiming Li: Real-Time Alert Stream Clustering and Correlation for Discovering Attack Strategies. FSKD (4) 2008: 379-384 |
30 | EE | Zhitang Li, Huaiqing Lin, Chuiwei Lu, Yejiang Zhang: Managing Data for Evaluating Trust in Unstructured Peer-to-Peer Networks. GPC 2008: 308-318 |
29 | EE | Yejiang Zhang, Zhitang Li, Zhengbing Hu, Hao Tu, Huaiqing Lin: A P2P E-commerce Related Network Security Issue: P2P Worm. ISECS 2008: 114-117 |
28 | EE | Dong Li, Zhitang Li, Jie Ma: Processing Intrusion Detection Alerts in Large-scale Network. ISECS 2008: 545-548 |
27 | EE | Hui Liu, Zhitang Li: Methodology of Network Intrusion Detection System Penetration Testing. WAIM 2008: 546-551 |
2007 | ||
26 | EE | Zhitang Li, Shudong Shi: A Secure Routing Protocol for Mobile Ad hoc Networks. ACIS-ICIS 2007: 153-157 |
25 | EE | Zhitang Li, Aifang Zhang, Dong Li, Li Wang: Discovering Novel Multistage Attack Strategies. ADMA 2007: 45-56 |
24 | EE | Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li: The Global Synthetical Processing of Network Security Events. FSKD (2) 2007: 492-496 |
23 | EE | Zhitang Li, Jie Lei, Li Wang, Dong Li: A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. FSKD (4) 2007: 307-311 |
22 | EE | Dong Li, Zhitang Li, Li Wang: Reducing False Positives Based on Time Sequence Analysis. FSKD (4) 2007: 67-71 |
21 | EE | Sisi Huang, Zhitang Li, Li Wang: Mining Attack Correlation Scenarios Based on Multi-agent System. HCI (8) 2007: 632-641 |
20 | EE | Zhitang Li, Aifang Zhang, Jie Lei, Li Wang: Real-Time Correlation of Network Security Alerts. ICEBE 2007: 73-80 |
19 | EE | Zhitang Li, Jun Fan, Wei Nie, Li Wang, Yuan Chen: A Novel MAC Protocol for Wireless Ad Hoc Networks with Power Control. MUE 2007: 347-352 |
18 | EE | Qingfeng Huang, Zhitang Li, Yejing Zhang, Chuiwei Lu: A Modified Non-Sieving Quadratic Sieve For Factoring Simple Blur Integers. MUE 2007: 729-732 |
17 | EE | Zhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma: Towards Identifying True Threat from Network Security Data. PAISI 2007: 160-171 |
16 | EE | Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li: An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. PAISI 2007: 316-317 |
15 | EE | Hao Tu, Zhitang Li, Bin Liu: Detecting Botnets by Analyzing DNS Traffic. PAISI 2007: 323-324 |
14 | EE | Li-Juan Zhou, Zhitang Li, Hao Tu: Proposion and Analysis of a TCP Feature of P2P Traffic. PAKDD 2007: 1148-1155 |
13 | EE | Li Wang, Zhitang Li, Dong Li, Jie Lei: Attack scenario construction with a new sequential mining technique. SNPD (1) 2007: 872-877 |
12 | EE | Li Wang, Zhitang Li, Jie Ma, Yang-ming Ma, Aifang Zhang: Automatic attack plan recognition from intrusion alerts. SNPD (3) 2007: 1170-1175 |
2006 | ||
11 | EE | Zhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li: Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. ATC 2006: 398-407 |
10 | EE | Li Wang, Zhitang Li, Jie Lei, Yao Li: A novel algorithm SF for mining attack scenarios model. ICEBE 2006: 55-61 |
9 | EE | Yao Li, Zhitang Li, Li Wang: Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function. ICIC (1) 2006: 553-562 |
8 | EE | Li Wang, Zhitang Li, Qi-hong Wang: A novel technique of recognizing multi-stage attack behaviour. IWNAS 2006: 188-193 |
7 | EE | Lingfang Zeng, Ke Zhou, Zhan Shi, Dan Feng, Fang Wang, Changsheng Xie, Zhitang Li, Zhanwu Yu, Jianya Gong, Qiang Cao, Zhongying Niu, Lingjun Qin, Qun Liu, Yao Li: Storage challenge - HUSt: a heterogeneous unified storage system for GIS grid. SC 2006: 325 |
6 | EE | Yao Li, Zhitang Li, Shuyu Liu: A Fuzzy Anomaly Detection Algorithm for IPv6. SKG 2006: 67 |
2005 | ||
5 | EE | Zhanchun Li, Zhitang Li, Yao Li, Bin Liu: Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function. CIS (2) 2005: 309-314 |
4 | EE | Bin Liu, Zhitang Li, Zhanchun Li: An Image Hiding Algorithm Based on Bit Plane. CIS (2) 2005: 611-616 |
3 | EE | Zhitang Li, Wei Guo, Fuquan Xu: Dependable Propagating Routing Information in MANET. ICCNMC 2005: 772-780 |
2 | EE | Lan Liu, Zhitang Li, Yong Xu, Chenggang Mei, Xiaoling Tan: A wavelet based distributed ID model. IEEE SCC 2005: 261-263 |
1 | EE | Liu Bin, Zhitang Li, Yao Li: An Image Hiding Method Based on Correlation Analysis and Image Fusion. PDCAT 2005: 1049-1051 |