2008 |
33 | EE | Chuiwei Lu,
Zhitang Li,
Huaiqin Lin,
Qingfeng Huang:
Fault-Tolerant Routing for P2P System with Structured Topology.
CSSE (3) 2008: 102-105 |
32 | EE | Hao Tu,
Zhitang Li,
Bin Liu:
Mining Network Traffic for Worm Signature Extraction.
FSKD (4) 2008: 327-331 |
31 | EE | Jie Ma,
Zhitang Li,
Weiming Li:
Real-Time Alert Stream Clustering and Correlation for Discovering Attack Strategies.
FSKD (4) 2008: 379-384 |
30 | EE | Zhitang Li,
Huaiqing Lin,
Chuiwei Lu,
Yejiang Zhang:
Managing Data for Evaluating Trust in Unstructured Peer-to-Peer Networks.
GPC 2008: 308-318 |
29 | EE | Yejiang Zhang,
Zhitang Li,
Zhengbing Hu,
Hao Tu,
Huaiqing Lin:
A P2P E-commerce Related Network Security Issue: P2P Worm.
ISECS 2008: 114-117 |
28 | EE | Dong Li,
Zhitang Li,
Jie Ma:
Processing Intrusion Detection Alerts in Large-scale Network.
ISECS 2008: 545-548 |
27 | EE | Hui Liu,
Zhitang Li:
Methodology of Network Intrusion Detection System Penetration Testing.
WAIM 2008: 546-551 |
2007 |
26 | EE | Zhitang Li,
Shudong Shi:
A Secure Routing Protocol for Mobile Ad hoc Networks.
ACIS-ICIS 2007: 153-157 |
25 | EE | Zhitang Li,
Aifang Zhang,
Dong Li,
Li Wang:
Discovering Novel Multistage Attack Strategies.
ADMA 2007: 45-56 |
24 | EE | Yang-ming Ma,
Zhitang Li,
Jie Lei,
Li Wang,
Dong Li:
The Global Synthetical Processing of Network Security Events.
FSKD (2) 2007: 492-496 |
23 | EE | Zhitang Li,
Jie Lei,
Li Wang,
Dong Li:
A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction.
FSKD (4) 2007: 307-311 |
22 | EE | Dong Li,
Zhitang Li,
Li Wang:
Reducing False Positives Based on Time Sequence Analysis.
FSKD (4) 2007: 67-71 |
21 | EE | Sisi Huang,
Zhitang Li,
Li Wang:
Mining Attack Correlation Scenarios Based on Multi-agent System.
HCI (8) 2007: 632-641 |
20 | EE | Zhitang Li,
Aifang Zhang,
Jie Lei,
Li Wang:
Real-Time Correlation of Network Security Alerts.
ICEBE 2007: 73-80 |
19 | EE | Zhitang Li,
Jun Fan,
Wei Nie,
Li Wang,
Yuan Chen:
A Novel MAC Protocol for Wireless Ad Hoc Networks with Power Control.
MUE 2007: 347-352 |
18 | EE | Qingfeng Huang,
Zhitang Li,
Yejing Zhang,
Chuiwei Lu:
A Modified Non-Sieving Quadratic Sieve For Factoring Simple Blur Integers.
MUE 2007: 729-732 |
17 | EE | Zhitang Li,
Jie Lei,
Li Wang,
Dong Li,
Yang-ming Ma:
Towards Identifying True Threat from Network Security Data.
PAISI 2007: 160-171 |
16 | EE | Yang-ming Ma,
Zhitang Li,
Jie Lei,
Li Wang,
Dong Li:
An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events.
PAISI 2007: 316-317 |
15 | EE | Hao Tu,
Zhitang Li,
Bin Liu:
Detecting Botnets by Analyzing DNS Traffic.
PAISI 2007: 323-324 |
14 | EE | Li-Juan Zhou,
Zhitang Li,
Hao Tu:
Proposion and Analysis of a TCP Feature of P2P Traffic.
PAKDD 2007: 1148-1155 |
13 | EE | Li Wang,
Zhitang Li,
Dong Li,
Jie Lei:
Attack scenario construction with a new sequential mining technique.
SNPD (1) 2007: 872-877 |
12 | EE | Li Wang,
Zhitang Li,
Jie Ma,
Yang-ming Ma,
Aifang Zhang:
Automatic attack plan recognition from intrusion alerts.
SNPD (3) 2007: 1170-1175 |
2006 |
11 | EE | Zhitang Li,
Weidong Wang,
Yejiang Zhang,
Weiming Li:
Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters.
ATC 2006: 398-407 |
10 | EE | Li Wang,
Zhitang Li,
Jie Lei,
Yao Li:
A novel algorithm SF for mining attack scenarios model.
ICEBE 2006: 55-61 |
9 | EE | Yao Li,
Zhitang Li,
Li Wang:
Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function.
ICIC (1) 2006: 553-562 |
8 | EE | Li Wang,
Zhitang Li,
Qi-hong Wang:
A novel technique of recognizing multi-stage attack behaviour.
IWNAS 2006: 188-193 |
7 | EE | Lingfang Zeng,
Ke Zhou,
Zhan Shi,
Dan Feng,
Fang Wang,
Changsheng Xie,
Zhitang Li,
Zhanwu Yu,
Jianya Gong,
Qiang Cao,
Zhongying Niu,
Lingjun Qin,
Qun Liu,
Yao Li:
Storage challenge - HUSt: a heterogeneous unified storage system for GIS grid.
SC 2006: 325 |
6 | EE | Yao Li,
Zhitang Li,
Shuyu Liu:
A Fuzzy Anomaly Detection Algorithm for IPv6.
SKG 2006: 67 |
2005 |
5 | EE | Zhanchun Li,
Zhitang Li,
Yao Li,
Bin Liu:
Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function.
CIS (2) 2005: 309-314 |
4 | EE | Bin Liu,
Zhitang Li,
Zhanchun Li:
An Image Hiding Algorithm Based on Bit Plane.
CIS (2) 2005: 611-616 |
3 | EE | Zhitang Li,
Wei Guo,
Fuquan Xu:
Dependable Propagating Routing Information in MANET.
ICCNMC 2005: 772-780 |
2 | EE | Lan Liu,
Zhitang Li,
Yong Xu,
Chenggang Mei,
Xiaoling Tan:
A wavelet based distributed ID model.
IEEE SCC 2005: 261-263 |
1 | EE | Liu Bin,
Zhitang Li,
Yao Li:
An Image Hiding Method Based on Correlation Analysis and Image Fusion.
PDCAT 2005: 1049-1051 |