The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Guangzhi Qu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Salim Hariri, Tushneem Dharmagadda, Modukuri Ramkishore, Guangzhi Qu, Cauligi S. Raghavendra
    Vulnerability Analysis of Faults/Attacks in Network Centric Systems. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2003, pp:256-261 [Conf]
  2. Guangzhi Qu, Salim Hariri, Santosh Jangiti, Jayprakash Rudraraju, Seungchan Oh, Samer Fayssal, Guangsen Zhang, Manish Parashar
    Online Monitoring and Analysis for Self-Protection against Network Attacks. [Citation Graph (0, 0)][DBLP]
    ICAC, 2004, pp:324-325 [Conf]
  3. Guangzhi Qu, Salim Hariri, Santosh Jangiti, Suhail Hussain, Seungchan Oh, Samer Fayssal, Mazin S. Yousif
    Abnormality Metrics to Detect and Protect against Network Attacks. [Citation Graph (0, 0)][DBLP]
    ICPS, 2004, pp:105-111 [Conf]
  4. Guangzhi Qu, Jayprakash Rudraraju, R. Modukuri, Salim Hariri, C. S. Raghavendra
    A Framework for Network Vulnerability Analysis. [Citation Graph (0, 0)][DBLP]
    Communications, Internet, and Information Technology, 2002, pp:289-294 [Conf]
  5. Salim Hariri, Guangzhi Qu, Tushneem Dharmagadda, Modukuri Ramkishore, Cauligi S. Raghavendra
    Impact Analysis of Faults and Attacks in Large-Scale Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:49-54 [Journal]
  6. Guangzhi Qu, Salim Hariri, Mazin S. Yousif
    A New Dependency and Correlation Analysis for Features. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2005, v:17, n:9, pp:1199-1207 [Journal]
  7. Guangzhi Qu, Salim Hariri, Mazin S. Yousif
    Multivariate statistical analysis for network attacks detection. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:9- [Conf]
  8. T. Xia, Guangzhi Qu, Salim Hariri, Mazin S. Yousif
    An efficient network intrusion detection method based on information theory and genetic algorithm. [Citation Graph (0, 0)][DBLP]
    IPCCC, 2005, pp:11-17 [Conf]

  9. Self-Protection against Attacks in an Autonomic Computing Environment. [Citation Graph (, )][DBLP]


  10. An Information Theoretic Model for Protocol Graph Based Anomaly Analysis. [Citation Graph (, )][DBLP]


  11. A Linear Integer Programming Approach to Objective Aware Feature Selection. [Citation Graph (, )][DBLP]


  12. Self-Configuration of Network Security. [Citation Graph (, )][DBLP]


  13. Multi-Level Intrusion Detection System (ML-IDS). [Citation Graph (, )][DBLP]


  14. Bucket Learning: Improving Model Quality through Enhancing Local Patterns. [Citation Graph (, )][DBLP]


  15. Anomaly-Based Behavior Analysis of Wireless Network Security. [Citation Graph (, )][DBLP]


Search in 0.244secs, Finished in 0.246secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002