Search the dblp DataBase
Huiqiang Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Huiqiang Wang , Yonggang Pang , Ye Du , Dong Xu , Daxin Liu Evaluation of Network Dependability Using Event Injection. [Citation Graph (0, 0)][DBLP ] APWeb Workshops, 2006, pp:991-998 [Conf ] Huiqiang Wang , Gaofei Wang , Ying Lan , Ke Wang , Daxin Liu A New Automatic Intrusion Response Taxonomy and Its Application. [Citation Graph (0, 0)][DBLP ] APWeb Workshops, 2006, pp:999-1003 [Conf ] Huiqiang Wang , Jian Wang , Guo-sheng Zhao A New Bio-inspired Model for Network Security and Its Application. [Citation Graph (0, 0)][DBLP ] APWeb Workshops, 2006, pp:756-759 [Conf ] Ye Du , Huiqiang Wang , Yonggang Pang HMMs for Anomaly Intrusion Detection. [Citation Graph (0, 0)][DBLP ] CIS, 2004, pp:692-697 [Conf ] Liran Shen , Qingbo Yin , Xueyao Li , Huiqiang Wang Speech Enhancement in Short-Wave Channel Based on Empirical Mode Decomposition. [Citation Graph (0, 0)][DBLP ] CSR, 2006, pp:591-599 [Conf ] Ye Du , Huiqiang Wang , Yonggang Pang A Useful System Prototype for Intrusion Detection - Architecture and Experiments. [Citation Graph (0, 0)][DBLP ] Discovery Science, 2004, pp:388-395 [Conf ] Ye Du , Huiqiang Wang , Yonggang Pang IADIDF: A Framework for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:895-898 [Conf ] Liran Shen , Xueyao Li , Qingbo Yin , Huiqiang Wang Speech Enhancement in Short-Wave Channel Based on ICA in Empirical Mode Decomposition Domain. [Citation Graph (0, 0)][DBLP ] ICA, 2006, pp:708-713 [Conf ] Liran Shen , Xueyao Li , Huiqiang Wang , Rubo Zhang Speech Hiding Based on Auditory Wavelet. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2004, pp:414-420 [Conf ] Liran Shen , Qingbo Yin , Xueyao Li , Huiqiang Wang Speech Stream Detection in Short-wave Channel Based on Cepstral of Auditory Wavelet Packets. [Citation Graph (0, 0)][DBLP ] IMSCCS (1), 2006, pp:203-207 [Conf ] Jian Wang , Huiqiang Wang , Guo-sheng Zhao ERAS - an Emergency Response Algorithm for Survivability of Critical Services. [Citation Graph (0, 0)][DBLP ] IMSCCS (2), 2006, pp:97-100 [Conf ] Huiqiang Wang , Ruijuan Zheng , Xueyao Li , Daxin Liu A Bio-inspired Multidimensional Network Security Model. [Citation Graph (0, 0)][DBLP ] IMSCCS (2), 2006, pp:3-7 [Conf ] Guo-sheng Zhao , Huiqiang Wang , Jian Wang A Novel Quantitative Analysis Method for Network Survivability. [Citation Graph (0, 0)][DBLP ] IMSCCS (2), 2006, pp:30-33 [Conf ] Ruijuan Zheng , Huiqiang Wang A Computer Immune System: LAN Immune System Model based on Host (LISMH). [Citation Graph (0, 0)][DBLP ] IMSCCS (2), 2006, pp:207-211 [Conf ] Huiqiang Wang , Jian Wang , Guo-sheng Zhao A Comprehensive Bio-inspired Model for Network Security. [Citation Graph (0, 0)][DBLP ] SKG, 2005, pp:119- [Conf ] Guo-sheng Zhao , Huiqiang Wang , Jian Wang , Linshan Shen A Novel Situation Awareness Model for Network Systems' Security. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2007, pp:1077-1084 [Conf ] Yonggang Pang , Huiqiang Wang , Ye Du Experiment of Event Injection Technology for Network Dependability Evaluation. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2007, pp:141-144 [Conf ] Ruijuan Zheng , Huiqiang Wang , Yonggang Pang Research on Bio-inspired Multi-net Paralleling Mechanism Based on Web Application. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2007, pp:117-120 [Conf ] A Self-Recovery Method Based on Mixed Reboot. [Citation Graph (, )][DBLP ] Heterogeneous Multisensor Data Fusion with Neural Network: Creating Network Security Situation Awareness. [Citation Graph (, )][DBLP ] Network Security Situation Awareness Based on Heterogeneous Multi-sensor Data Fusion and Neural Network. [Citation Graph (, )][DBLP ] A Quantitative Forecast Method of Network Security Situation Basedon BP Neural Network with Genetic Algorithm. [Citation Graph (, )][DBLP ] An Improved Key Management Scheme for Heterogeneity Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Dynamic Self-configuration of User QoS for Next Generation Network. [Citation Graph (, )][DBLP ] A Kind of Formal Modelling for Network Security Situational Awareness Based on HMM. [Citation Graph (, )][DBLP ] A Strategy Selection Model for Network Survivability Based on Fuzzy Matrix Game. [Citation Graph (, )][DBLP ] Research on Autonomic-Trusted Software Evaluation. [Citation Graph (, )][DBLP ] The Research and Design of the Belt Grinder which Based on PLC. [Citation Graph (, )][DBLP ] A Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs