dblp.uni-trier.dewww.uni-trier.de

Zonghua Zhang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
19EEZonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho: Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. ARES 2008: 352-359
18EEZonghua Zhang, Ruo Ando, Youki Kadobayashi: Hardening Botnet by a Rational Botmaster. Inscrypt 2008: 348-369
17EEHaibo Zhang, Hong Shen, Yawen Chen, Zonghua Zhang: Balancing energy consumption for uniform data gathering wireless sensor networks. PODC 2008: 436
16EEZonghua Zhang, Farid Naït-Abdesselam, Xiaodong Lin, Pin-Han Ho: A model-based semi-quantitative approach for evaluating security of enterprise networks. SAC 2008: 1069-1074
15EEZonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Xiaodong Lin: RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. WCNC 2008: 2621-2626
14EEPin-Han Ho, Zonghua Zhang, Rongxing Lu: Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal. Security and Communication Networks 1(3): 191-193 (2008)
13EESoufiene Djahel, Farid Naït-Abdesselam, Zonghua Zhang, Ashfaq A. Khokhar: Defending against packet dropping attack in vehicular ad hoc networks. Security and Communication Networks 1(3): 245-258 (2008)
2007
12EEZonghua Zhang, Hong Shen: Constructing a Multilayered Boundary to Defend against Intrusive Anomalies. IEICE Transactions 90-D(2): 490-499 (2007)
11EEZonghua Zhang, Nikolaus F. Troje: 3D Periodic Human Motion Reconstruction from 2D Motion Sequences. Neural Computation 19(5): 1400-1421 (2007)
2006
10EEZonghua Zhang, Pin-Han Ho, Xiaodong Lin, Hong Shen: Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. ICISC 2006: 136-154
2005
9EEZonghua Zhang, Hong Shen: Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator. DSN 2005: 118-127
8EEZonghua Zhang, Hong Shen: Dynamic Combination of Multiple Host-Based Anomaly Detectors with Broader Detection Coverage and Fewer False Alerts. ICN (2) 2005: 989-996
7EEZonghua Zhang, Hong Shen: A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection. ISPEC 2005: 178-191
6EEYingpeng Sang, Hong Shen, Zonghua Zhang: An Efficient Protocol for the Problem of Secure Two-party Vector Dominance. PDCAT 2005: 488-492
5EEZonghua Zhang, Hong Shen, Xavier Défago, Yingpeng Sang: A Brief Comparative Study on Analytical Models of Computer System Dependability and Security. PDCAT 2005: 493-497
4EEZonghua Zhang, Hong Shen: Application of online-training SVMs for real-time intrusion detection with different considerations. Computer Communications 28(12): 1428-1442 (2005)
3EEZonghua Zhang, Nikolaus F. Troje: View-independent person identification from human gait. Neurocomputing 69(1-3): 250-256 (2005)
2004
2EEZonghua Zhang, Hong Shen: Online Training of SVMs for Real-time Intrusion Detection. AINA (1) 2004: 568-573
1EEZonghua Zhang, Hong Shen: Suppressing False Alarms of Intrusion Detection Using Improved Text Categorization Method. EEE 2004: 163-166

Coauthor Index

1Ruo Ando [18]
2Yawen Chen [17]
3Xavier Défago [5]
4Soufiene Djahel [13]
5Pin-Han Ho [10] [14] [15] [16] [19]
6Youki Kadobayashi [18]
7Ashfaq A. Khokhar [13]
8Xiaodong Lin [10] [15] [16]
9Rongxing Lu [14]
10Farid Naït-Abdesselam [13] [15] [16] [19]
11Yingpeng Sang [5] [6]
12Hong Shen [1] [2] [4] [5] [6] [7] [8] [9] [10] [12] [17]
13Nikolaus F. Troje [3] [11]
14Haibo Zhang [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)