The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Huiqiang Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Huiqiang Wang, Yonggang Pang, Ye Du, Dong Xu, Daxin Liu
    Evaluation of Network Dependability Using Event Injection. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:991-998 [Conf]
  2. Huiqiang Wang, Gaofei Wang, Ying Lan, Ke Wang, Daxin Liu
    A New Automatic Intrusion Response Taxonomy and Its Application. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:999-1003 [Conf]
  3. Huiqiang Wang, Jian Wang, Guo-sheng Zhao
    A New Bio-inspired Model for Network Security and Its Application. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:756-759 [Conf]
  4. Ye Du, Huiqiang Wang, Yonggang Pang
    HMMs for Anomaly Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:692-697 [Conf]
  5. Liran Shen, Qingbo Yin, Xueyao Li, Huiqiang Wang
    Speech Enhancement in Short-Wave Channel Based on Empirical Mode Decomposition. [Citation Graph (0, 0)][DBLP]
    CSR, 2006, pp:591-599 [Conf]
  6. Ye Du, Huiqiang Wang, Yonggang Pang
    A Useful System Prototype for Intrusion Detection - Architecture and Experiments. [Citation Graph (0, 0)][DBLP]
    Discovery Science, 2004, pp:388-395 [Conf]
  7. Ye Du, Huiqiang Wang, Yonggang Pang
    IADIDF: A Framework for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:895-898 [Conf]
  8. Liran Shen, Xueyao Li, Qingbo Yin, Huiqiang Wang
    Speech Enhancement in Short-Wave Channel Based on ICA in Empirical Mode Decomposition Domain. [Citation Graph (0, 0)][DBLP]
    ICA, 2006, pp:708-713 [Conf]
  9. Liran Shen, Xueyao Li, Huiqiang Wang, Rubo Zhang
    Speech Hiding Based on Auditory Wavelet. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:414-420 [Conf]
  10. Liran Shen, Qingbo Yin, Xueyao Li, Huiqiang Wang
    Speech Stream Detection in Short-wave Channel Based on Cepstral of Auditory Wavelet Packets. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:203-207 [Conf]
  11. Jian Wang, Huiqiang Wang, Guo-sheng Zhao
    ERAS - an Emergency Response Algorithm for Survivability of Critical Services. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:97-100 [Conf]
  12. Huiqiang Wang, Ruijuan Zheng, Xueyao Li, Daxin Liu
    A Bio-inspired Multidimensional Network Security Model. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:3-7 [Conf]
  13. Guo-sheng Zhao, Huiqiang Wang, Jian Wang
    A Novel Quantitative Analysis Method for Network Survivability. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:30-33 [Conf]
  14. Ruijuan Zheng, Huiqiang Wang
    A Computer Immune System: LAN Immune System Model based on Host (LISMH). [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:207-211 [Conf]
  15. Huiqiang Wang, Jian Wang, Guo-sheng Zhao
    A Comprehensive Bio-inspired Model for Network Security. [Citation Graph (0, 0)][DBLP]
    SKG, 2005, pp:119- [Conf]
  16. Guo-sheng Zhao, Huiqiang Wang, Jian Wang, Linshan Shen
    A Novel Situation Awareness Model for Network Systems' Security. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:1077-1084 [Conf]
  17. Yonggang Pang, Huiqiang Wang, Ye Du
    Experiment of Event Injection Technology for Network Dependability Evaluation. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:141-144 [Conf]
  18. Ruijuan Zheng, Huiqiang Wang, Yonggang Pang
    Research on Bio-inspired Multi-net Paralleling Mechanism Based on Web Application. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:117-120 [Conf]

  19. A Self-Recovery Method Based on Mixed Reboot. [Citation Graph (, )][DBLP]


  20. Heterogeneous Multisensor Data Fusion with Neural Network: Creating Network Security Situation Awareness. [Citation Graph (, )][DBLP]


  21. Network Security Situation Awareness Based on Heterogeneous Multi-sensor Data Fusion and Neural Network. [Citation Graph (, )][DBLP]


  22. A Quantitative Forecast Method of Network Security Situation Basedon BP Neural Network with Genetic Algorithm. [Citation Graph (, )][DBLP]


  23. An Improved Key Management Scheme for Heterogeneity Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  24. Dynamic Self-configuration of User QoS for Next Generation Network. [Citation Graph (, )][DBLP]


  25. A Kind of Formal Modelling for Network Security Situational Awareness Based on HMM. [Citation Graph (, )][DBLP]


  26. A Strategy Selection Model for Network Survivability Based on Fuzzy Matrix Game. [Citation Graph (, )][DBLP]


  27. Research on Autonomic-Trusted Software Evaluation. [Citation Graph (, )][DBLP]


  28. The Research and Design of the Belt Grinder which Based on PLC. [Citation Graph (, )][DBLP]


  29. A Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002