dblp.uni-trier.dewww.uni-trier.de

Xiao-chun Yun

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
32EEYaoting Jiao, Mei Yang, Yingtao Jiang, Yulu Yang, Xiao-chun Yun: Deadlock-Free Multi-Path Routing for Torus-Based NoCs. ITNG 2008: 253-258
31EEShankar Neelkrishnan, Mei Yang, Yingtao Jiang, Lei Zhang, Yulu Yang, Enyue Lu, Xiao-chun Yun: Design and Implementation of a Parameterized NoC Router and its Application to Build PRDT-Based NoCs. ITNG 2008: 259-264
30EETianning Zang, Xiao-chun Yun, Yongzheng Zhang: A Survey of Alert Fusion Techniques for Security Incident. WAIM 2008: 475-481
29EEGuangjun Wu, Xiao-chun Yun, Shupeng Wang: Design and Implementation of Multi-Version Disk Backup Data Merging Algorithm. WAIM 2008: 526-531
28EEWei-ling Chang, Xiao-chun Yun, Binxing Fang, Shupeng Wang, Shuhao Li: A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme. WAIM 2008: 558-563
2007
27EEYong Wang, Xiao-chun Yun, Yifei Li: Analyzing the Characteristics of Gnutella Overlays. ITNG 2007: 1095-1100
26EEBing Wu, Xiao-chun Yun, Xiang Cui: Study on Worm Poisoning Technology. ITNG 2007: 65-70
25EEShupeng Wang, Jianping Wang, Mei Yang, Xiao-chun Yun, Yingtao Jiang: Handover Cost Optimization in Traffic Management for Multi-homed Mobile Networks. UIC 2007: 295-308
24EEPing Wang, Binxing Fang, Xiao-chun Yun, Jun Zheng: A User-Habit Property: Haunting of Users in IP Networks. IEICE Transactions 90-D(1): 371-373 (2007)
23EEYuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng: How to construct secure proxy cryptosystem. Inf. Sci. 177(19): 4095-4108 (2007)
22EEShupeng Wang, Xiao-chun Yun, Xiang-Zhan Yu: Survivability and Makespan Driven Scheduling Algorithm for Grid Workflow Applications. J. Inf. Sci. Eng. 23(4): 1299-1313 (2007)
2006
21EEWu Yang, Xiao-chun Yun, Jian-Hua Li: An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers. APWeb Workshops 2006: 835-841
20EEChen Bo, Binxing Fang, Xiao-chun Yun: Adaptive Method for Monitoring Network and Early Detection of Internet Worms. ISI 2006: 178-189
19EEHao Luo, Binxing Fang, Xiao-chun Yun: A Counting-Based Method for Massive Spam Mail Classification. ISPEC 2006: 45-56
18EEPing Wang, Binxing Fang, Xiao-chun Yun: Model and Estimation of Worm Propagation Under Network Partition. ISPEC 2006: 57-66
17EEHao Luo, Binxing Fang, Xiao-chun Yun: Anomaly Detection in SMTP Traffic. ITNG 2006: 408-413
16EEZhiyu Hao, Xiao-chun Yun, Hongli Zhang: An Efficient Routing Mechanism in Network Simulation. PADS 2006: 150-157
2005
15EEWu Yang, Xiao-chun Yun, Yongtian Yang: Using Boosting Learning Method for Intrusion Detection. ADMA 2005: 634-641
14EEPing Wang, Binxing Fang, Xiao-chun Yun: A New User-Habit Based Approach for Early Warning of Worms. CIS (2) 2005: 212-219
13EEYongzheng Zhang, Binxing Fang, Yue Chi, Xiao-chun Yun: Assessment of Windows System Security Using Vulnerability Relationship Graph. CIS (2) 2005: 415-420
12EEBaiLing Wang, Binxing Fang, Xiao-chun Yun: A Worm Behavioral Approach to Susceptible Host Detection. GCC 2005: 77-83
11 Wu Yang, Xiao-chun Yun, Jian-Hua Li: An Improved Network Intrusion Detection Method based on VQ-SVM. IASTED PDCS 2005: 583-587
10EEYi-xuan Liu, Xiao-chun Yun, BaiLing Wang, Hai-bin Sun: An Anti-worm with Balanced Tree Based Spreading Strategy. ICMLC 2005: 652-661
9EEYang Wu, Xiao-chun Yun: A High-Performance Network Monitoring Platform for Intrusion Detection. ICOIN 2005: 52-61
8EETao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang: Computer Vulnerability Evaluation Using Fault Tree Analysis. ISPEC 2005: 302-313
7EEPing Wang, Binxing Fang, Xiao-chun Yun: A New Approach to Automatically Detect Worms. PDCAT 2005: 259-263
6EEYi Xin, Binxing Fang, Xiao-chun Yun, Hai-Yong Chen: Worm Detection in Large Scale Network by Traffic. PDCAT 2005: 270-273
5 Yu Xiangzhan, Xiao-chun Yun, Shupeng Wang: Implementation of a Dynamic Failover Technology. PDPTA 2005: 339-345
2004
4 Shupeng Wang, Xiao-chun Yun: An improved failure detector based on pull and push approach. Communications, Internet, and Information Technology 2004: 161-167
3 Yongzheng Zhang, Xiao-chun Yun: A New Vulnerability Taxonomy Based on Privilege Escalation. ICEIS (3) 2004: 596-600
2EEZhihong Tian, Binxing Fang, Xiao-chun Yun: Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method. Web Intelligence 2004: 24-28
2003
1 Xiu-guo Bao, Ming-zheng Hu, Xiao-chun Yun, Ri Ding: Anti-Sniffing in Unbounded Networks. ICWI 2003: 580-586

Coauthor Index

1Xiu-guo Bao [1]
2Chen Bo [20]
3Zhenfu Cao [23]
4Wei-ling Chang [28]
5Hai-Yong Chen [6]
6Xiaoming Cheng [23]
7Yue Chi [13]
8Xiang Cui [26]
9Ri Ding [1]
10Binxing Fang [2] [6] [7] [12] [13] [14] [17] [18] [19] [20] [23] [24] [28]
11Zhiyu Hao [16]
12Ming-zheng Hu [1]
13Mingzeng Hu (Ming-Zeng Hu) [8]
14Yingtao Jiang [25] [31] [32]
15Yaoting Jiao [32]
16Jian-Hua Li [11] [21]
17Shuhao Li [28]
18Yifei Li [27]
19Yi-xuan Liu [10]
20Enyue Lu [31]
21Hao Luo [17] [19]
22Shankar Neelkrishnan [31]
23Hai-bin Sun [10]
24Zhihong Tian [2]
25BaiLing Wang [10] [12]
26Jianping Wang [25]
27Ping Wang [7] [14] [18] [24]
28Shupeng Wang [4] [5] [22] [25] [28] [29]
29Yong Wang [27]
30Bing Wu [26]
31Guangjun Wu [29]
32Yang Wu [9]
33Yu Xiangzhan [5]
34Yi Xin [6]
35Mei Yang [25] [31] [32]
36Wu Yang [11] [15] [21]
37Yongtian Yang [15]
38Yulu Yang [31] [32]
39Xiang-Zhan Yu [22]
40Tianning Zang [30]
41Hongli Zhang [16]
42Lei Zhang [31]
43Tao Zhang [8]
44Yongzheng Zhang [3] [8] [13] [30]
45Jun Zheng [24]
46Yuan Zhou [23]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)