The SCEAS System
Navigation Menu

Search the dblp DataBase


Zhitang Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lan Liu, Zhitang Li, Yong Xu, Chenggang Mei, Xiaoling Tan
    A wavelet based distributed ID model. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:261-263 [Conf]
  2. Zhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li
    Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:398-407 [Conf]
  3. Bin Liu, Zhitang Li, Zhanchun Li
    An Image Hiding Algorithm Based on Bit Plane. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:611-616 [Conf]
  4. Zhanchun Li, Zhitang Li, Yao Li, Bin Liu
    Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:309-314 [Conf]
  5. Zhitang Li, Wei Guo, Fuquan Xu
    Dependable Propagating Routing Information in MANET. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:772-780 [Conf]
  6. Li Wang, Zhitang Li, Jie Lei, Yao Li
    A novel algorithm SF for mining attack scenarios model. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2006, pp:55-61 [Conf]
  7. Yao Li, Zhitang Li, Li Wang
    Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:553-562 [Conf]
  8. Liu Bin, Zhitang Li, Yao Li
    An Image Hiding Method Based on Correlation Analysis and Image Fusion. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:1049-1051 [Conf]
  9. Lingfang Zeng, Ke Zhou, Zhan Shi, Dan Feng, Fang Wang, Changsheng Xie, Zhitang Li, Zhanwu Yu, Jianya Gong, Qiang Cao, Zhongying Niu, Lingjun Qin, Qun Liu, Yao Li
    Storage challenge - HUSt: a heterogeneous unified storage system for GIS grid. [Citation Graph (0, 0)][DBLP]
    SC, 2006, pp:325- [Conf]
  10. Li Wang, Zhitang Li, Qi-hong Wang
    A novel technique of recognizing multi-stage attack behaviour. [Citation Graph (0, 0)][DBLP]
    IWNAS, 2006, pp:188-193 [Conf]
  11. LiJuan Zhou, Zhitong Li, Bin Liu
    P2P Traffic Identification by TCP Flow Analysis. [Citation Graph (0, 0)][DBLP]
    IWNAS, 2006, pp:47-50 [Conf]
  12. Yao Li, Zhitang Li, Shuyu Liu
    A Fuzzy Anomaly Detection Algorithm for IPv6. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:67- [Conf]
  13. Zhitang Li, Jun Fan, Wei Nie, Li Wang, Yuan Chen
    A Novel MAC Protocol for Wireless Ad Hoc Networks with Power Control. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:347-352 [Conf]
  14. Qingfeng Huang, Zhitang Li, Yejing Zhang, Chuiwei Lu
    A Modified Non-Sieving Quadratic Sieve For Factoring Simple Blur Integers. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:729-732 [Conf]
  15. Zhitang Li, Shudong Shi
    A Secure Routing Protocol for Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:153-157 [Conf]
  16. Zhitang Li, Aifang Zhang, Dong Li, Li Wang
    Discovering Novel Multistage Attack Strategies. [Citation Graph (0, 0)][DBLP]
    ADMA, 2007, pp:45-56 [Conf]
  17. Sisi Huang, Zhitang Li, Li Wang
    Mining Attack Correlation Scenarios Based on Multi-agent System. [Citation Graph (0, 0)][DBLP]
    HCI (8), 2007, pp:632-641 [Conf]
  18. Li-Juan Zhou, Zhitang Li, Hao Tu
    Proposion and Analysis of a TCP Feature of P2P Traffic. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2007, pp:1148-1155 [Conf]
  19. Zhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma
    Towards Identifying True Threat from Network Security Data. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:160-171 [Conf]
  20. Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li
    An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:316-317 [Conf]
  21. Hao Tu, Zhitang Li, Bin Liu
    Detecting Botnets by Analyzing DNS Traffic. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:323-324 [Conf]

  22. Measuring Peer-to-Peer Botnets Using Control Flow Stability. [Citation Graph (, )][DBLP]

  23. A Method for Spam Behavior Recognition Based on Fuzzy Decision Tree. [Citation Graph (, )][DBLP]

  24. Modeling and Analyzing Dynamic Forensics System Based on Intrusion Tolerance. [Citation Graph (, )][DBLP]

  25. A Measurement and Modeling Study of P2P IPTV Applications. [Citation Graph (, )][DBLP]

  26. Mining Network Traffic for Worm Signature Extraction. [Citation Graph (, )][DBLP]

  27. Real-Time Alert Stream Clustering and Correlation for Discovering Attack Strategies. [Citation Graph (, )][DBLP]

  28. The Global Synthetical Processing of Network Security Events. [Citation Graph (, )][DBLP]

  29. Reducing False Positives Based on Time Sequence Analysis. [Citation Graph (, )][DBLP]

  30. A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. [Citation Graph (, )][DBLP]

  31. Managing Data for Evaluating Trust in Unstructured Peer-to-Peer Networks. [Citation Graph (, )][DBLP]

  32. Real-Time Correlation of Network Security Alerts. [Citation Graph (, )][DBLP]

  33. Attack scenario construction with a new sequential mining technique. [Citation Graph (, )][DBLP]

  34. Automatic attack plan recognition from intrusion alerts. [Citation Graph (, )][DBLP]

  35. Methodology of Network Intrusion Detection System Penetration Testing. [Citation Graph (, )][DBLP]

  36. Measuring Botnet Size by Using URL and Collaborative MailServers. [Citation Graph (, )][DBLP]

  37. Security Evaluation Method Based on Host Resource Availability. [Citation Graph (, )][DBLP]

  38. Session-Based Tunnel Scheduling Model in Multi-link Aggregate IPSec VPN. [Citation Graph (, )][DBLP]

  39. A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining. [Citation Graph (, )][DBLP]

  40. Processing Intrusion Detection Alerts in Large-scale Network. [Citation Graph (, )][DBLP]

  41. A P2P E-commerce Related Network Security Issue: P2P Worm. [Citation Graph (, )][DBLP]

  42. Fault-Tolerant Routing for P2P System with Structured Topology. [Citation Graph (, )][DBLP]

  43. Discovering Novel Multistage Attack Patterns in Alert Streams. [Citation Graph (, )][DBLP]

  44. A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS. [Citation Graph (, )][DBLP]

  45. Assessing Attack Threat by the Probability of Following Attacks. [Citation Graph (, )][DBLP]

  46. State Machine Based CDMA Stress Testing Service System. [Citation Graph (, )][DBLP]

  47. Hierarchical Fuzzy Trust Management for Customer-to-Customer in Peer-to-Peer eCommerce. [Citation Graph (, )][DBLP]

  48. Using Simulation to Characterize Topology of Peer to Peer Botnets. [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.008secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002