The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wu Yang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wu Yang, Xiao-chun Yun, Yong-Tian Yang
    Using Boosting Learning Method for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ADMA, 2005, pp:634-641 [Conf]
  2. Wu Yang, Xiao-chun Yun, Jian-Hua Li
    An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:835-841 [Conf]
  3. Wu Yang, Ya Luo, Ping Guo, HuangFu Tao, Bo He
    A Model for Classification of Topological Relationships Between Two Spatial Objects. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:723-726 [Conf]
  4. Wu Yang, Falai Chen
    Merging a pair of disk Bézier curves. [Citation Graph (0, 0)][DBLP]
    GRAPHITE, 2004, pp:65-70 [Conf]
  5. Wu Yang, Xiao-chun Yun, Jian-Hua Li
    An Improved Network Intrusion Detection Method based on VQ-SVM. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2005, pp:583-587 [Conf]
  6. Bo He, Yue Wang, Wu Yang, Yuan Chen
    Fast Algorithm for Mining Global Frequent Itemsets Based on Distributed Database. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:415-420 [Conf]
  7. Falai Chen, Wu Yang
    Degree reduction of disk Be'zier curves. [Citation Graph (0, 0)][DBLP]
    , 2004, v:, n:, pp:263-280 [Journal]
  8. Wu Yang, Bin-Xing Fang, Bo Liu, Hong-Li Zhang
    Intrusion detection system for high-speed network. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:13, pp:1288-1294 [Journal]
  9. Guo Huashan, Yao Hongjun, Wu Yang, Yang Tian, Zhang Wei, Guo Jianjun
    A Study on Fast Preparation of Electron Microscope Biological Specimens. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:611-614 [Conf]

  10. An Efficient Survivability Hierarchy Analysis Model for Networked Information System. [Citation Graph (, )][DBLP]


  11. A Quantitative Evaluation Model for Network Security. [Citation Graph (, )][DBLP]


  12. A Method to Enhance Service Survivability Based on Autonomous Configuration. [Citation Graph (, )][DBLP]


  13. A Method for Global Attack Graph Generation. [Citation Graph (, )][DBLP]


  14. The Application of Unascertained Measure Model to the Safety Evaluation of Bofang Coal Seam-Roof Stabiity. [Citation Graph (, )][DBLP]


  15. A Dual-Center Event Description Model Used in Event Tracking. [Citation Graph (, )][DBLP]


  16. Study of Index Weight in Network Threat Evaluation Based on Improved Grey Theory. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002