2009 |
7 | EE | Xiaohong Guan,
Wei Wang,
Xiangliang Zhang:
Fast intrusion detection based on a non-negative matrix factorization model.
J. Network and Computer Applications 32(1): 31-44 (2009) |
2008 |
6 | EE | Xiangliang Zhang,
Cyril Furtlehner,
Michèle Sebag:
Data Streaming with Affinity Propagation.
ECML/PKDD (2) 2008: 628-643 |
5 | | Xiangliang Zhang,
Cyril Furtlehner,
Michèle Sebag:
Distributed and Incremental Clustering Based on Weighted Affinity Propagation.
STAIRS 2008: 199-210 |
4 | EE | Wei Wang,
Xiaohong Guan,
Xiangliang Zhang:
Processing of massive audit data streams for real-time anomaly intrusion detection.
Computer Communications 31(1): 58-72 (2008) |
2007 |
3 | EE | Xiangliang Zhang,
Michèle Sebag,
Cécile Germain:
Toward Behavioral Modeling of a Grid System: Mining the Logging and Bookkeeping Files.
ICDM Workshops 2007: 581-588 |
2006 |
2 | EE | Wei Wang,
Xiaohong Guan,
Xiangliang Zhang,
Liwei Yang:
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data.
Computers & Security 25(7): 539-550 (2006) |
2004 |
1 | EE | Wei Wang,
Xiaohong Guan,
Xiangliang Zhang:
A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security.
ISNN (2) 2004: 657-662 |