|
Search the dblp DataBase
Fengmin Gong:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Chong Xu, Fengmin Gong, Ilia Baldine, Liang Han, Xinzhou Qin
Building Security-Aware Applications on Celestial Network Security Management Infrastructure. [Citation Graph (0, 0)][DBLP] International Conference on Internet Computing, 2000, pp:219-226 [Conf]
- Steven L. Blake, Sarah A. Rajala, Fengmin Gong, Tony L. Mitchell
Efficient Techniques for Two-Layer Coding of Video Sequences. [Citation Graph (0, 0)][DBLP] ICIP (1), 1994, pp:253-257 [Conf]
- D. Qu, Brain Vetter, Feiyi Wang, R. Narayan, Shyhtsun Felix Wu, Y. Frank Jou, Fengmin Gong, C. Sargor
Statistical Anomaly Detection for Link-State Routing Protocols. [Citation Graph (0, 0)][DBLP] ICNP, 1998, pp:62-70 [Conf]
- Fengming Gong, Guru M. Parulkar
Study of Two-Level Flow Control Scheme and Buffering Strategies. [Citation Graph (0, 0)][DBLP] INFOCOM, 1994, pp:1224-1233 [Conf]
- Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fengmin Gong, Ilia Baldine, Chong Xu
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution. [Citation Graph (0, 0)][DBLP] POLICY, 2001, pp:39-56 [Conf]
- Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Yuh Huang
Intrusion Detection for an On-Going Attack. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
- Jim Yuill, Shyhtsun Felix Wu, J. Settle, Fengmin Gong, R. Forno, Ming-Yuh Huang, J. Asbery
Intrusion-detection for incident-response, using a military battlefield-intelligence process. [Citation Graph (0, 0)][DBLP] Computer Networks, 2000, v:34, n:4, pp:671-697 [Journal]
- Fengmin Gong, Guru M. Parulkar
An application-oriented error control scheme for high-speed networks. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 1996, v:4, n:5, pp:669-683 [Journal]
ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|