The SCEAS System
Navigation Menu

Search the dblp DataBase


Fengmin Gong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chong Xu, Fengmin Gong, Ilia Baldine, Liang Han, Xinzhou Qin
    Building Security-Aware Applications on Celestial Network Security Management Infrastructure. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2000, pp:219-226 [Conf]
  2. Steven L. Blake, Sarah A. Rajala, Fengmin Gong, Tony L. Mitchell
    Efficient Techniques for Two-Layer Coding of Video Sequences. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 1994, pp:253-257 [Conf]
  3. D. Qu, Brain Vetter, Feiyi Wang, R. Narayan, Shyhtsun Felix Wu, Y. Frank Jou, Fengmin Gong, C. Sargor
    Statistical Anomaly Detection for Link-State Routing Protocols. [Citation Graph (0, 0)][DBLP]
    ICNP, 1998, pp:62-70 [Conf]
  4. Fengming Gong, Guru M. Parulkar
    Study of Two-Level Flow Control Scheme and Buffering Strategies. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1994, pp:1224-1233 [Conf]
  5. Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fengmin Gong, Ilia Baldine, Chong Xu
    IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution. [Citation Graph (0, 0)][DBLP]
    POLICY, 2001, pp:39-56 [Conf]
  6. Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Yuh Huang
    Intrusion Detection for an On-Going Attack. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  7. Jim Yuill, Shyhtsun Felix Wu, J. Settle, Fengmin Gong, R. Forno, Ming-Yuh Huang, J. Asbery
    Intrusion-detection for incident-response, using a military battlefield-intelligence process. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:34, n:4, pp:671-697 [Journal]
  8. Fengmin Gong, Guru M. Parulkar
    An application-oriented error control scheme for high-speed networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1996, v:4, n:5, pp:669-683 [Journal]

  9. ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol. [Citation Graph (, )][DBLP]

Search in 0.001secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002