The SCEAS System
Navigation Menu

Search the dblp DataBase


Jianhua Yang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Junrang Li, Zhaohui Wu, Jianhua Yang, Mingwang Xia
    A Secure Model for Network-Attached Storage on the Grid. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2004, pp:604-608 [Conf]
  2. Jianhua Yang, Yongzhong Zhang
    Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:18-32 [Conf]
  3. Ming D. Wan, Shou-Hsuan Stephen Huang, Jianhua Yang
    Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:255-262 [Conf]
  4. Jianhua Yang, Shou-Hsuan Stephen Huang
    Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:1005-1010 [Conf]
  5. Jianhua Yang, Shou-Hsuan Stephen Huang, Ming D. Wan
    A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:231-236 [Conf]
  6. Yongzhong Zhang, Jianhua Yang, Chunming Ye
    Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:477-486 [Conf]
  7. Junfeng Wang, Jianhua Yang, Gaogang Xie, Mingtian Zhou, Zhongcheng Li
    Measurement-Based Modeling with Adaptive Sampling. [Citation Graph (0, 0)][DBLP]
    Asian Test Symposium, 2003, pp:340-347 [Conf]
  8. Ickjai Lee, Jianhua Yang
    Hybrid Agglomerative Clustering for Large Databases: An Efficient Interactivity Approach. [Citation Graph (0, 0)][DBLP]
    Australian Conference on Artificial Intelligence, 2005, pp:938-941 [Conf]
  9. Jianhua Yang, Ickjai Lee
    Hybrid O(n Ön) Clustering for Sequential Web Usage Mining. [Citation Graph (0, 0)][DBLP]
    Australian Conference on Artificial Intelligence, 2006, pp:1022-1026 [Conf]
  10. Jianhua Yang, Byong Lee, Yongzhong Zhang
    Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:303-317 [Conf]
  11. Vladimir Estivill-Castro, Jianhua Yang
    Cluster Validity Using Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2003, pp:244-256 [Conf]
  12. Jianhua Yang, Zhaohui Wu, Siliang Tang, Xiaosheng Guo
    Virtual Battlefield Attack-Defense Countermeasure Simulation on the Grid. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:164-172 [Conf]
  13. Jianhua Yang, Shou-Hsuan Stephen Huang
    Improved Thumbprint and Its Application for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:433-442 [Conf]
  14. Gaogang Xie, Jianhua Yang, Valérie Issarny, Alberto Conte
    An Accurate and Efficient 3-Phase Measurement Method for IP Traffic Flow on High Speed Link. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:46- [Conf]
  15. Jianhua Yang, Ickjai Lee
    Cluster Validity Through Graph-based Boundary Analysis. [Citation Graph (0, 0)][DBLP]
    IKE, 2004, pp:204-210 [Conf]
  16. Yiyou Dong, Jianhua Yang, Zhaohui Wu
    ODSG: An Architecture of Ontology-based Distributed Simulation on Grid. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:759-765 [Conf]
  17. Jianhua Yang, Wei Lu, Wenqi Liu
    PID Controller Based on the Artificial Neural Network. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2004, pp:144-149 [Conf]
  18. Xiangguo Li, Jianhua Yang, Zhaohui Wu
    An NFSv4-Based Security Scheme for NAS. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:130-139 [Conf]
  19. Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang
    Resistance Analysis to Intruders' Evasion of Detecting Intrusion. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:383-397 [Conf]
  20. Wenqi Liu, Jianhua Yang, Lei Wei
    A Secure Threshold Proxy Signature Scheme for Mobile Agent-Based Electronic Commerce Transactions. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2006, pp:454-459 [Conf]
  21. Vladimir Estivill-Castro, Jianhua Yang
    Non-crisp Clustering by Fast, Convergent, and Robust Algorithms. [Citation Graph (0, 0)][DBLP]
    PKDD, 2001, pp:103-114 [Conf]
  22. Vladimir Estivill-Castro, Jianhua Yang
    Fast and Robust General Purpose Clustering Algorithms. [Citation Graph (0, 0)][DBLP]
    PRICAI, 2000, pp:208-218 [Conf]
  23. Vladimir Estivill-Castro, Jianhua Yang
    Categorizing Visitors Dynamically by Fast and Robust Clustering of Access Logs. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2001, pp:498-507 [Conf]
  24. Ickjai Lee, Jianhua Yang
    Voronoi-based Topological Information for Combining Partitioning and Hierarchical Clustering. [Citation Graph (0, 0)][DBLP]
    CIMCA/IAWTIC, 2005, pp:484-489 [Conf]
  25. Qinglin Zhao, Li Feng, Zhongcheng Li, Jianhua Yang
    Movement detection delay analysis in mobile IP. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:5, pp:550-556 [Journal]
  26. Jianhua Yang, Shou-Hsuan Stephen Huang
    Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2007, v:26, n:2, pp:137-144 [Journal]
  27. Vladimir Estivill-Castro, Jianhua Yang
    Fast and Robust General Purpose Clustering Algorithms. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 2004, v:8, n:2, pp:127-150 [Journal]
  28. Vladimir Estivill-Castro, Jianhua Yang
    Clustering Web Visitors by Fast, Robust and Convergent Algorithms. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2002, v:13, n:4, pp:497-520 [Journal]
  29. Jianhua Yang, Di Jin, Ye Li, Kai-Steffen Jens Hielscher, Reinhard German
    Modeling and simulation of performance analysis for a cluster-based Web server. [Citation Graph (0, 0)][DBLP]
    Simulation Modelling Practice and Theory, 2006, v:14, n:2, pp:188-200 [Journal]
  30. Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang
    Stepping-Stone Detection Via Request-Response Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:276-285 [Conf]
  31. Gaogang Xie, Guangxing Zhang, Jianhua Yang, Yinghua Min, Valérie Issarny, Alberto Conte
    Survey on Traffic of Metro Area Network with Measurement On-Line. [Citation Graph (0, 0)][DBLP]
    International Teletraffic Congress, 2007, pp:666-677 [Conf]

  32. Monitoring Network Traffic to Detect Stepping-Stone Intrusion. [Citation Graph (, )][DBLP]

  33. Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion. [Citation Graph (, )][DBLP]

  34. Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. [Citation Graph (, )][DBLP]

  35. Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain. [Citation Graph (, )][DBLP]

  36. Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. [Citation Graph (, )][DBLP]

  37. Integrative Performance Evaluation for Strategic Supplier's under Supply Chain Management Based on Logarithm Triangular Fuzzy Number- AHP Method. [Citation Graph (, )][DBLP]

  38. On the construction and implementation methods for performance measurement of reverse supply chain. [Citation Graph (, )][DBLP]

  39. Research on Multi-Agent Parallel Computing Model of Hydrothermal Economic Dispatch in Power System. [Citation Graph (, )][DBLP]

  40. Mitigate DDoS attack using TTL buckets and host threatening index. [Citation Graph (, )][DBLP]

  41. Fuzzy Integrative Performance Evaluation for Supply Chain System. [Citation Graph (, )][DBLP]

  42. Feedback and Resources Guided Mechanism for Adaptive Packet Sampling. [Citation Graph (, )][DBLP]

  43. Handover Latency of MIPv6 Implementation in Linux. [Citation Graph (, )][DBLP]

  44. Diabetes Identification and Classification by Means of a Breath Analysis System. [Citation Graph (, )][DBLP]

  45. Hybrid Clustering for Large Sequential Data. [Citation Graph (, )][DBLP]

  46. A Ubiquitous and Cooperative Service Framework for Network Robot System. [Citation Graph (, )][DBLP]

  47. Mining TCP/IP packets to detect stepping-stone intrusion. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.008secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002