Search the dblp DataBase
Guoqiang Shu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Guoqiang Shu , David Lee , Mihalis Yannakakis A note on broadcast encryption key management with applications to large scale emergency alert systems. [Citation Graph (0, 0)][DBLP ] IPDPS, 2006, pp:- [Conf ] Guoqiang Shu , David Lee Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking. [Citation Graph (0, 0)][DBLP ] TestCom, 2006, pp:357-372 [Conf ] Guoqiang Shu , Chao Li , Qing Wang , Mingshu Li Validating Objected-Oriented Prototype of Real-Time Systems with Timed Automata. [Citation Graph (0, 0)][DBLP ] IEEE International Workshop on Rapid System Prototyping, 2002, pp:99-0 [Conf ] Guoqiang Shu , David Lee Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach. [Citation Graph (0, 0)][DBLP ] ICDCS, 2007, pp:25- [Conf ] Guoqiang Shu , David Lee Network Protocol System Fingerprinting - A Formal Approach. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Zhijun Liu , Guoqiang Shu , Na Li , David Lee Defending against Instant Messaging Worms. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning. [Citation Graph (, )][DBLP ] VCSTC: Virtual Cyber Security Testing Capability - An Application Oriented Paradigm for Network Infrastructure Protection. [Citation Graph (, )][DBLP ] Testing Patterns. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs