|
Search the dblp DataBase
Jingbo Hao:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Boyun Zhang, Jianping Yin, Jingbo Hao
Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. [Citation Graph (0, 0)][DBLP] FSKD (1), 2005, pp:629-634 [Conf]
- Jingbo Hao, Jianping Yin, Boyun Zhang
Evolvable Viral Agent Modeling and Exploration. [Citation Graph (0, 0)][DBLP] ICONIP (3), 2006, pp:866-873 [Conf]
- Jingbo Hao, Jianping Yin, Boyun Zhang
Modeling Viral Agents and Their Dynamics with Persistent Turing Machines and Cellular Automata. [Citation Graph (0, 0)][DBLP] PRIMA, 2006, pp:690-695 [Conf]
- Boyun Zhang, Jianping Yin, Jingbo Hao
Using RS and SVM to Detect New Malicious Executable Codes. [Citation Graph (0, 0)][DBLP] RSKT, 2006, pp:574-579 [Conf]
- Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang
Malicious Codes Detection Based on Ensemble Learning. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:468-477 [Conf]
- Boyun Zhang, Jianping Yin, Jingbo Hao, Shulin Wang, Dingxing Zhang
New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory. [Citation Graph (0, 0)][DBLP] CIS, 2006, pp:626-633 [Conf]
- Boyun Zhang, Jianping Yin, Jingbo Hao
Intelligent Detection Computer Viruses Based on Multiple Classifiers. [Citation Graph (0, 0)][DBLP] UIC, 2007, pp:1181-1190 [Conf]
A Computational Model of Computer Worms Based on Persistent Turing Machines. [Citation Graph (, )][DBLP]
Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine. [Citation Graph (, )][DBLP]
A Preliminary Study of Coordinated Worm Networks. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|