The SCEAS System
Navigation Menu

Search the dblp DataBase


Xiao-chun Yun: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wu Yang, Xiao-chun Yun, Yong-Tian Yang
    Using Boosting Learning Method for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ADMA, 2005, pp:634-641 [Conf]
  2. Wu Yang, Xiao-chun Yun, Jian-Hua Li
    An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:835-841 [Conf]
  3. Ping Wang, Binxing Fang, Xiao-chun Yun
    A New User-Habit Based Approach for Early Warning of Worms. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:212-219 [Conf]
  4. Yongzheng Zhang, Binxing Fang, Yue Chi, Xiao-chun Yun
    Assessment of Windows System Security Using Vulnerability Relationship Graph. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:415-420 [Conf]
  5. BaiLing Wang, Binxing Fang, Xiao-chun Yun
    A Worm Behavioral Approach to Susceptible Host Detection. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:77-83 [Conf]
  6. Xiu-guo Bao, Ming-zheng Hu, Xiao-chun Yun, Ri Ding
    Anti-Sniffing in Unbounded Networks. [Citation Graph (0, 0)][DBLP]
    ICWI, 2003, pp:580-586 [Conf]
  7. Yongzheng Zhang, Xiao-chun Yun
    A New Vulnerability Taxonomy Based on Privilege Escalation. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2004, pp:596-600 [Conf]
  8. Yi-xuan Liu, Xiao-chun Yun, BaiLing Wang, Hai-bin Sun
    An Anti-worm with Balanced Tree Based Spreading Strategy. [Citation Graph (0, 0)][DBLP]
    ICMLC, 2005, pp:652-661 [Conf]
  9. Yang Wu, Xiao-chun Yun
    A High-Performance Network Monitoring Platform for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:52-61 [Conf]
  10. Chen Bo, Binxing Fang, Xiao-chun Yun
    Adaptive Method for Monitoring Network and Early Detection of Internet Worms. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:178-189 [Conf]
  11. Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang
    Computer Vulnerability Evaluation Using Fault Tree Analysis. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:302-313 [Conf]
  12. Hao Luo, Binxing Fang, Xiao-chun Yun
    A Counting-Based Method for Massive Spam Mail Classification. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:45-56 [Conf]
  13. Ping Wang, Binxing Fang, Xiao-chun Yun
    Model and Estimation of Worm Propagation Under Network Partition. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:57-66 [Conf]
  14. Hao Luo, Binxing Fang, Xiao-chun Yun
    Anomaly Detection in SMTP Traffic. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:408-413 [Conf]
  15. Yong Wang, Xiaochun Yun, Yifei Li
    Analyzing the Characteristics of Gnutella Overlays. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1095-1100 [Conf]
  16. Bing Wu, Xiaochun Yun, Xiang Cui
    Study on Worm Poisoning Technology. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:65-70 [Conf]
  17. Zhiyu Hao, Xiao-chun Yun, Hongli Zhang
    An Efficient Routing Mechanism in Network Simulation. [Citation Graph (0, 0)][DBLP]
    PADS, 2006, pp:150-157 [Conf]
  18. Ping Wang, Binxing Fang, Xiao-chun Yun
    A New Approach to Automatically Detect Worms. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:259-263 [Conf]
  19. Yi Xin, Binxing Fang, Xiao-chun Yun, Hai-Yong Chen
    Worm Detection in Large Scale Network by Traffic. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:270-273 [Conf]
  20. Wu Yang, Xiao-chun Yun, Jian-Hua Li
    An Improved Network Intrusion Detection Method based on VQ-SVM. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2005, pp:583-587 [Conf]
  21. Yu Xiangzhan, Xiao-chun Yun, Shupeng Wang
    Implementation of a Dynamic Failover Technology. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2005, pp:339-345 [Conf]
  22. Zhihong Tian, Binxing Fang, Xiao-chun Yun
    Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2004, pp:24-28 [Conf]
  23. Shupeng Wang, Xiao-chun Yun
    An improved failure detector based on pull and push approach. [Citation Graph (0, 0)][DBLP]
    Communications, Internet, and Information Technology, 2004, pp:161-167 [Conf]
  24. Shupeng Wang, Jianping Wang, Mei Yang, Xiao-chun Yun, Yingtao Jiang
    Handover Cost Optimization in Traffic Management for Multi-homed Mobile Networks. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:295-308 [Conf]
  25. Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng
    How to construct secure proxy cryptosystem. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:19, pp:4095-4108 [Journal]
  26. Shupeng Wang, Xiao-chun Yun, Xiang-zhan Yu
    Survivability and Makespan Driven Scheduling Algorithm for Grid Workflow Applications. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2007, v:23, n:4, pp:1299-1313 [Journal]

  27. The Block LZSS Compression Algorithm. [Citation Graph (, )][DBLP]

  28. A Pseudo-Random Number Generator Based on LZSS. [Citation Graph (, )][DBLP]

  29. Deadlock-Free Multi-Path Routing for Torus-Based NoCs. [Citation Graph (, )][DBLP]

  30. Design and Implementation of a Parameterized NoC Router and its Application to Build PRDT-Based NoCs. [Citation Graph (, )][DBLP]

  31. A review of classification methods for network vulnerability. [Citation Graph (, )][DBLP]

  32. A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme. [Citation Graph (, )][DBLP]

  33. A Survey of Alert Fusion Techniques for Security Incident. [Citation Graph (, )][DBLP]

  34. Design and Implementation of Multi-Version Disk Backup Data Merging Algorithm. [Citation Graph (, )][DBLP]

  35. Randomness Testing of Compressed Data [Citation Graph (, )][DBLP]

Search in 0.215secs, Finished in 0.217secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002