|
Search the dblp DataBase
Jie Lei:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Li Wang, Zhitang Li, Jie Lei, Yao Li
A novel algorithm SF for mining attack scenarios model. [Citation Graph (0, 0)][DBLP] ICEBE, 2006, pp:55-61 [Conf]
- Zhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma
Towards Identifying True Threat from Network Security Data. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:160-171 [Conf]
- Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li
An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:316-317 [Conf]
The Global Synthetical Processing of Network Security Events. [Citation Graph (, )][DBLP]
A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. [Citation Graph (, )][DBLP]
Real-Time Correlation of Network Security Alerts. [Citation Graph (, )][DBLP]
Attack scenario construction with a new sequential mining technique. [Citation Graph (, )][DBLP]
Assessing Attack Threat by the Probability of Following Attacks. [Citation Graph (, )][DBLP]
An improved framework for automatic image mosaic. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|