Search the dblp DataBase
Zhitang Li :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Lan Liu , Zhitang Li , Yong Xu , Chenggang Mei , Xiaoling Tan A wavelet based distributed ID model. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2005, pp:261-263 [Conf ] Zhitang Li , Weidong Wang , Yejiang Zhang , Weiming Li Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:398-407 [Conf ] Bin Liu , Zhitang Li , Zhanchun Li An Image Hiding Algorithm Based on Bit Plane. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:611-616 [Conf ] Zhanchun Li , Zhitang Li , Yao Li , Bin Liu Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:309-314 [Conf ] Zhitang Li , Wei Guo , Fuquan Xu Dependable Propagating Routing Information in MANET. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:772-780 [Conf ] Li Wang , Zhitang Li , Jie Lei , Yao Li A novel algorithm SF for mining attack scenarios model. [Citation Graph (0, 0)][DBLP ] ICEBE, 2006, pp:55-61 [Conf ] Yao Li , Zhitang Li , Li Wang Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2006, pp:553-562 [Conf ] Liu Bin , Zhitang Li , Yao Li An Image Hiding Method Based on Correlation Analysis and Image Fusion. [Citation Graph (0, 0)][DBLP ] PDCAT, 2005, pp:1049-1051 [Conf ] Lingfang Zeng , Ke Zhou , Zhan Shi , Dan Feng , Fang Wang , Changsheng Xie , Zhitang Li , Zhanwu Yu , Jianya Gong , Qiang Cao , Zhongying Niu , Lingjun Qin , Qun Liu , Yao Li Storage challenge - HUSt: a heterogeneous unified storage system for GIS grid. [Citation Graph (0, 0)][DBLP ] SC, 2006, pp:325- [Conf ] Li Wang , Zhitang Li , Qi-hong Wang A novel technique of recognizing multi-stage attack behaviour. [Citation Graph (0, 0)][DBLP ] IWNAS, 2006, pp:188-193 [Conf ] LiJuan Zhou , Zhitong Li , Bin Liu P2P Traffic Identification by TCP Flow Analysis. [Citation Graph (0, 0)][DBLP ] IWNAS, 2006, pp:47-50 [Conf ] Yao Li , Zhitang Li , Shuyu Liu A Fuzzy Anomaly Detection Algorithm for IPv6. [Citation Graph (0, 0)][DBLP ] SKG, 2006, pp:67- [Conf ] Zhitang Li , Jun Fan , Wei Nie , Li Wang , Yuan Chen A Novel MAC Protocol for Wireless Ad Hoc Networks with Power Control. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:347-352 [Conf ] Qingfeng Huang , Zhitang Li , Yejing Zhang , Chuiwei Lu A Modified Non-Sieving Quadratic Sieve For Factoring Simple Blur Integers. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:729-732 [Conf ] Zhitang Li , Shudong Shi A Secure Routing Protocol for Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:153-157 [Conf ] Zhitang Li , Aifang Zhang , Dong Li , Li Wang Discovering Novel Multistage Attack Strategies. [Citation Graph (0, 0)][DBLP ] ADMA, 2007, pp:45-56 [Conf ] Sisi Huang , Zhitang Li , Li Wang Mining Attack Correlation Scenarios Based on Multi-agent System. [Citation Graph (0, 0)][DBLP ] HCI (8), 2007, pp:632-641 [Conf ] Li-Juan Zhou , Zhitang Li , Hao Tu Proposion and Analysis of a TCP Feature of P2P Traffic. [Citation Graph (0, 0)][DBLP ] PAKDD, 2007, pp:1148-1155 [Conf ] Zhitang Li , Jie Lei , Li Wang , Dong Li , Yang-ming Ma Towards Identifying True Threat from Network Security Data. [Citation Graph (0, 0)][DBLP ] PAISI, 2007, pp:160-171 [Conf ] Yang-ming Ma , Zhitang Li , Jie Lei , Li Wang , Dong Li An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. [Citation Graph (0, 0)][DBLP ] PAISI, 2007, pp:316-317 [Conf ] Hao Tu , Zhitang Li , Bin Liu Detecting Botnets by Analyzing DNS Traffic. [Citation Graph (0, 0)][DBLP ] PAISI, 2007, pp:323-324 [Conf ] Measuring Peer-to-Peer Botnets Using Control Flow Stability. [Citation Graph (, )][DBLP ] A Method for Spam Behavior Recognition Based on Fuzzy Decision Tree. [Citation Graph (, )][DBLP ] Modeling and Analyzing Dynamic Forensics System Based on Intrusion Tolerance. [Citation Graph (, )][DBLP ] A Measurement and Modeling Study of P2P IPTV Applications. [Citation Graph (, )][DBLP ] Mining Network Traffic for Worm Signature Extraction. [Citation Graph (, )][DBLP ] Real-Time Alert Stream Clustering and Correlation for Discovering Attack Strategies. [Citation Graph (, )][DBLP ] The Global Synthetical Processing of Network Security Events. [Citation Graph (, )][DBLP ] Reducing False Positives Based on Time Sequence Analysis. [Citation Graph (, )][DBLP ] A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. [Citation Graph (, )][DBLP ] Managing Data for Evaluating Trust in Unstructured Peer-to-Peer Networks. [Citation Graph (, )][DBLP ] Real-Time Correlation of Network Security Alerts. [Citation Graph (, )][DBLP ] Attack scenario construction with a new sequential mining technique. [Citation Graph (, )][DBLP ] Automatic attack plan recognition from intrusion alerts. [Citation Graph (, )][DBLP ] Methodology of Network Intrusion Detection System Penetration Testing. [Citation Graph (, )][DBLP ] Measuring Botnet Size by Using URL and Collaborative MailServers. [Citation Graph (, )][DBLP ] Security Evaluation Method Based on Host Resource Availability. [Citation Graph (, )][DBLP ] Session-Based Tunnel Scheduling Model in Multi-link Aggregate IPSec VPN. [Citation Graph (, )][DBLP ] A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining. [Citation Graph (, )][DBLP ] Processing Intrusion Detection Alerts in Large-scale Network. [Citation Graph (, )][DBLP ] A P2P E-commerce Related Network Security Issue: P2P Worm. [Citation Graph (, )][DBLP ] Fault-Tolerant Routing for P2P System with Structured Topology. [Citation Graph (, )][DBLP ] Discovering Novel Multistage Attack Patterns in Alert Streams. [Citation Graph (, )][DBLP ] A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS. [Citation Graph (, )][DBLP ] Assessing Attack Threat by the Probability of Following Attacks. [Citation Graph (, )][DBLP ] State Machine Based CDMA Stress Testing Service System. [Citation Graph (, )][DBLP ] Hierarchical Fuzzy Trust Management for Customer-to-Customer in Peer-to-Peer eCommerce. [Citation Graph (, )][DBLP ] Using Simulation to Characterize Topology of Peer to Peer Botnets. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.306secs