The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wanyu Zang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Meng Yu, Peng Liu, Wanyu Zang
    Multi-Version Attack Recovery for Workflow System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:142-151 [Conf]
  2. Meng Yu, Wanyu Zang, Peng Liu
    Defensive Execution of Transactional Processes against Attacks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:515-526 [Conf]
  3. Peng Liu, Wanyu Zang
    Incentive-based modeling and inference of attacker intent, objectives, and strategies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:179-189 [Conf]
  4. Meng Yu, Peng Liu, Wanyu Zang
    Self-Healing Workflow Systems under Attacks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:418-425 [Conf]
  5. Wanyu Zang, Meng Yu
    A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:289-302 [Conf]
  6. Meng Yu, Minyi Guo, Yi Pan, Wanyu Zang, Li Xie
    JAPS-II: A Source to Source Parallelizing Compiler for Java. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2002, pp:164-170 [Conf]
  7. Meng Yu, Peng Liu, Wanyu Zang
    Intrusion Masking for Distributed Atomic Operations. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:229-240 [Conf]
  8. Meng Yu, Peng Liu, Wanyu Zang
    Specifying and using intrusion masking models to process distributed operations. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:4, pp:623-658 [Journal]
  9. Peng Liu, Wanyu Zang, Meng Yu
    Incentive-based modeling and inference of attacker intent, objectives, and strategies. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:78-118 [Journal]

  10. Database Isolation and Filtering against Data Corruption Attacks. [Citation Graph (, )][DBLP]


  11. An Attack-Resilient Channel Assignment MAC Protocol. [Citation Graph (, )][DBLP]


  12. Decentralized Trust Management based on the Reputation of Information Sources. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002