|
Search the dblp DataBase
Wanyu Zang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Meng Yu, Peng Liu, Wanyu Zang
Multi-Version Attack Recovery for Workflow System. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:142-151 [Conf]
- Meng Yu, Wanyu Zang, Peng Liu
Defensive Execution of Transactional Processes against Attacks. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:515-526 [Conf]
- Peng Liu, Wanyu Zang
Incentive-based modeling and inference of attacker intent, objectives, and strategies. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:179-189 [Conf]
- Meng Yu, Peng Liu, Wanyu Zang
Self-Healing Workflow Systems under Attacks. [Citation Graph (0, 0)][DBLP] ICDCS, 2004, pp:418-425 [Conf]
- Wanyu Zang, Meng Yu
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:289-302 [Conf]
- Meng Yu, Minyi Guo, Yi Pan, Wanyu Zang, Li Xie
JAPS-II: A Source to Source Parallelizing Compiler for Java. [Citation Graph (0, 0)][DBLP] PDPTA, 2002, pp:164-170 [Conf]
- Meng Yu, Peng Liu, Wanyu Zang
Intrusion Masking for Distributed Atomic Operations. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:229-240 [Conf]
- Meng Yu, Peng Liu, Wanyu Zang
Specifying and using intrusion masking models to process distributed operations. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:4, pp:623-658 [Journal]
- Peng Liu, Wanyu Zang, Meng Yu
Incentive-based modeling and inference of attacker intent, objectives, and strategies. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:78-118 [Journal]
Database Isolation and Filtering against Data Corruption Attacks. [Citation Graph (, )][DBLP]
An Attack-Resilient Channel Assignment MAC Protocol. [Citation Graph (, )][DBLP]
Decentralized Trust Management based on the Reputation of Information Sources. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.003secs
|