|
Search the dblp DataBase
Guangzhi Qu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Salim Hariri, Tushneem Dharmagadda, Modukuri Ramkishore, Guangzhi Qu, Cauligi S. Raghavendra
Vulnerability Analysis of Faults/Attacks in Network Centric Systems. [Citation Graph (0, 0)][DBLP] ISCA PDCS, 2003, pp:256-261 [Conf]
- Guangzhi Qu, Salim Hariri, Santosh Jangiti, Jayprakash Rudraraju, Seungchan Oh, Samer Fayssal, Guangsen Zhang, Manish Parashar
Online Monitoring and Analysis for Self-Protection against Network Attacks. [Citation Graph (0, 0)][DBLP] ICAC, 2004, pp:324-325 [Conf]
- Guangzhi Qu, Salim Hariri, Santosh Jangiti, Suhail Hussain, Seungchan Oh, Samer Fayssal, Mazin S. Yousif
Abnormality Metrics to Detect and Protect against Network Attacks. [Citation Graph (0, 0)][DBLP] ICPS, 2004, pp:105-111 [Conf]
- Guangzhi Qu, Jayprakash Rudraraju, R. Modukuri, Salim Hariri, C. S. Raghavendra
A Framework for Network Vulnerability Analysis. [Citation Graph (0, 0)][DBLP] Communications, Internet, and Information Technology, 2002, pp:289-294 [Conf]
- Salim Hariri, Guangzhi Qu, Tushneem Dharmagadda, Modukuri Ramkishore, Cauligi S. Raghavendra
Impact Analysis of Faults and Attacks in Large-Scale Networks. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:5, pp:49-54 [Journal]
- Guangzhi Qu, Salim Hariri, Mazin S. Yousif
A New Dependency and Correlation Analysis for Features. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:9, pp:1199-1207 [Journal]
- Guangzhi Qu, Salim Hariri, Mazin S. Yousif
Multivariate statistical analysis for network attacks detection. [Citation Graph (0, 0)][DBLP] AICCSA, 2005, pp:9- [Conf]
- T. Xia, Guangzhi Qu, Salim Hariri, Mazin S. Yousif
An efficient network intrusion detection method based on information theory and genetic algorithm. [Citation Graph (0, 0)][DBLP] IPCCC, 2005, pp:11-17 [Conf]
Self-Protection against Attacks in an Autonomic Computing Environment. [Citation Graph (, )][DBLP]
An Information Theoretic Model for Protocol Graph Based Anomaly Analysis. [Citation Graph (, )][DBLP]
A Linear Integer Programming Approach to Objective Aware Feature Selection. [Citation Graph (, )][DBLP]
Self-Configuration of Network Security. [Citation Graph (, )][DBLP]
Multi-Level Intrusion Detection System (ML-IDS). [Citation Graph (, )][DBLP]
Bucket Learning: Improving Model Quality through Enhancing Local Patterns. [Citation Graph (, )][DBLP]
Anomaly-Based Behavior Analysis of Wireless Network Security. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|