dblp.uni-trier.dewww.uni-trier.de

Zhitang Li

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
33EEChuiwei Lu, Zhitang Li, Huaiqin Lin, Qingfeng Huang: Fault-Tolerant Routing for P2P System with Structured Topology. CSSE (3) 2008: 102-105
32EEHao Tu, Zhitang Li, Bin Liu: Mining Network Traffic for Worm Signature Extraction. FSKD (4) 2008: 327-331
31EEJie Ma, Zhitang Li, Weiming Li: Real-Time Alert Stream Clustering and Correlation for Discovering Attack Strategies. FSKD (4) 2008: 379-384
30EEZhitang Li, Huaiqing Lin, Chuiwei Lu, Yejiang Zhang: Managing Data for Evaluating Trust in Unstructured Peer-to-Peer Networks. GPC 2008: 308-318
29EEYejiang Zhang, Zhitang Li, Zhengbing Hu, Hao Tu, Huaiqing Lin: A P2P E-commerce Related Network Security Issue: P2P Worm. ISECS 2008: 114-117
28EEDong Li, Zhitang Li, Jie Ma: Processing Intrusion Detection Alerts in Large-scale Network. ISECS 2008: 545-548
27EEHui Liu, Zhitang Li: Methodology of Network Intrusion Detection System Penetration Testing. WAIM 2008: 546-551
2007
26EEZhitang Li, Shudong Shi: A Secure Routing Protocol for Mobile Ad hoc Networks. ACIS-ICIS 2007: 153-157
25EEZhitang Li, Aifang Zhang, Dong Li, Li Wang: Discovering Novel Multistage Attack Strategies. ADMA 2007: 45-56
24EEYang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li: The Global Synthetical Processing of Network Security Events. FSKD (2) 2007: 492-496
23EEZhitang Li, Jie Lei, Li Wang, Dong Li: A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. FSKD (4) 2007: 307-311
22EEDong Li, Zhitang Li, Li Wang: Reducing False Positives Based on Time Sequence Analysis. FSKD (4) 2007: 67-71
21EESisi Huang, Zhitang Li, Li Wang: Mining Attack Correlation Scenarios Based on Multi-agent System. HCI (8) 2007: 632-641
20EEZhitang Li, Aifang Zhang, Jie Lei, Li Wang: Real-Time Correlation of Network Security Alerts. ICEBE 2007: 73-80
19EEZhitang Li, Jun Fan, Wei Nie, Li Wang, Yuan Chen: A Novel MAC Protocol for Wireless Ad Hoc Networks with Power Control. MUE 2007: 347-352
18EEQingfeng Huang, Zhitang Li, Yejing Zhang, Chuiwei Lu: A Modified Non-Sieving Quadratic Sieve For Factoring Simple Blur Integers. MUE 2007: 729-732
17EEZhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma: Towards Identifying True Threat from Network Security Data. PAISI 2007: 160-171
16EEYang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li: An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. PAISI 2007: 316-317
15EEHao Tu, Zhitang Li, Bin Liu: Detecting Botnets by Analyzing DNS Traffic. PAISI 2007: 323-324
14EELi-Juan Zhou, Zhitang Li, Hao Tu: Proposion and Analysis of a TCP Feature of P2P Traffic. PAKDD 2007: 1148-1155
13EELi Wang, Zhitang Li, Dong Li, Jie Lei: Attack scenario construction with a new sequential mining technique. SNPD (1) 2007: 872-877
12EELi Wang, Zhitang Li, Jie Ma, Yang-ming Ma, Aifang Zhang: Automatic attack plan recognition from intrusion alerts. SNPD (3) 2007: 1170-1175
2006
11EEZhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li: Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. ATC 2006: 398-407
10EELi Wang, Zhitang Li, Jie Lei, Yao Li: A novel algorithm SF for mining attack scenarios model. ICEBE 2006: 55-61
9EEYao Li, Zhitang Li, Li Wang: Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function. ICIC (1) 2006: 553-562
8EELi Wang, Zhitang Li, Qi-hong Wang: A novel technique of recognizing multi-stage attack behaviour. IWNAS 2006: 188-193
7EELingfang Zeng, Ke Zhou, Zhan Shi, Dan Feng, Fang Wang, Changsheng Xie, Zhitang Li, Zhanwu Yu, Jianya Gong, Qiang Cao, Zhongying Niu, Lingjun Qin, Qun Liu, Yao Li: Storage challenge - HUSt: a heterogeneous unified storage system for GIS grid. SC 2006: 325
6EEYao Li, Zhitang Li, Shuyu Liu: A Fuzzy Anomaly Detection Algorithm for IPv6. SKG 2006: 67
2005
5EEZhanchun Li, Zhitang Li, Yao Li, Bin Liu: Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function. CIS (2) 2005: 309-314
4EEBin Liu, Zhitang Li, Zhanchun Li: An Image Hiding Algorithm Based on Bit Plane. CIS (2) 2005: 611-616
3EEZhitang Li, Wei Guo, Fuquan Xu: Dependable Propagating Routing Information in MANET. ICCNMC 2005: 772-780
2EELan Liu, Zhitang Li, Yong Xu, Chenggang Mei, Xiaoling Tan: A wavelet based distributed ID model. IEEE SCC 2005: 261-263
1EELiu Bin, Zhitang Li, Yao Li: An Image Hiding Method Based on Correlation Analysis and Image Fusion. PDCAT 2005: 1049-1051

Coauthor Index

1Liu Bin [1]
2Qiang Cao [7]
3Yuan Chen [19]
4Jun Fan [19]
5Dan Feng [7]
6Jianya Gong [7]
7Wei Guo [3]
8Zhengbing Hu [29]
9Qingfeng Huang [18] [33]
10Sisi Huang [21]
11Jie Lei [10] [13] [16] [17] [20] [23] [24]
12Dong Li [13] [16] [17] [22] [23] [24] [25] [28]
13Weiming Li [11] [31]
14Yao Li [1] [5] [6] [7] [9] [10]
15Zhanchun Li [4] [5]
16Huaiqin Lin [33]
17Huaiqing Lin [29] [30]
18Bin Liu [4] [5] [15] [32]
19Hui Liu [27]
20Lan Liu [2]
21Qun Liu [7]
22Shuyu Liu [6]
23Chuiwei Lu [18] [30] [33]
24Jie Ma [12] [28] [31]
25Yang-ming Ma [12] [16] [17] [24]
26Chenggang Mei [2]
27Wei Nie [19]
28Zhongying Niu [7]
29Lingjun Qin [7]
30Shudong Shi [26]
31Zhan Shi [7]
32Xiaoling Tan [2]
33Hao Tu [14] [15] [29] [32]
34Fang Wang [7]
35Li Wang [8] [9] [10] [12] [13] [16] [17] [19] [20] [21] [22] [23] [24] [25]
36Qi-hong Wang [8]
37Weidong Wang [11]
38Changsheng Xie [7]
39Fuquan Xu [3]
40Yong Xu [2]
41Zhanwu Yu [7]
42Lingfang Zeng [7]
43Aifang Zhang [12] [20] [25]
44Yejiang Zhang [11] [29] [30]
45Yejing Zhang [18]
46Ke Zhou [7]
47Li-Juan Zhou [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)