The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zesheng Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zesheng Chen, Lixin Gao, Kevin A. Kwiat
    Modeling the Spread of Active Worms. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  2. Zesheng Chen, Chuanyi Ji
    A self-learning worm using importance scanning. [Citation Graph (0, 0)][DBLP]
    WORM, 2005, pp:22-29 [Conf]
  3. Zesheng Chen, Chuanyi Ji
    Measuring Network-Aware Worm Spreading Ability. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:116-124 [Conf]

  4. PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms. [Citation Graph (, )][DBLP]


  5. A Closed-Form Expression for Static Worm-Scanning Strategies. [Citation Graph (, )][DBLP]


  6. Spatial-Temporal Characteristics of Internet Malicious Sources. [Citation Graph (, )][DBLP]


  7. Understanding Localized-Scanning Worms. [Citation Graph (, )][DBLP]


  8. Modeling primary user emulation attacks and defenses in cognitive radio networks. [Citation Graph (, )][DBLP]


  9. Inferring Internet Worm Temporal Characteristics. [Citation Graph (, )][DBLP]


  10. Packet-Mode Asynchronous Scheduling Algorithm for Partially Buffered Crossbar Switches. [Citation Graph (, )][DBLP]


  11. An Information-Theoretical View of Network-Aware Malware Attacks [Citation Graph (, )][DBLP]


  12. Characterizing Internet Worm Infection Structure [Citation Graph (, )][DBLP]


  13. Darknet-Based Inference of Internet Worm Temporal Characteristics [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002