|
Search the dblp DataBase
Wu Liu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wu Liu, Haixin Duan, Jianping Wu, Xing Li
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:518-525 [Conf]
- Hong Zhang, Haixin Duan, Wu Liu, Jianping Wu
An Extensible AAA Infrastructure for IPv6. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:482-487 [Conf]
- Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li
New Algorithm Mining Intrusion Patterns. [Citation Graph (0, 0)][DBLP] FSKD (2), 2005, pp:774-777 [Conf]
- Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li, Ping Ren
Algorithms for Congestion Detection and Control. [Citation Graph (0, 0)][DBLP] GCC Workshops, 2004, pp:374-381 [Conf]
- Wu Liu, Hai-Xin Duan, Jianping Wu, Ping Ren, Li-Hua Lu
Distributed IDS Tracing Back to Attacking Sources. [Citation Graph (0, 0)][DBLP] GCC (1), 2003, pp:859-866 [Conf]
- Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping Ren
XML Based X.509 Authorization in CERNET Grid. [Citation Graph (0, 0)][DBLP] GCC, 2004, pp:325-332 [Conf]
- Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li
New Method for Intrusion Features Mining in IDS. [Citation Graph (0, 0)][DBLP] ICIC (1), 2005, pp:429-437 [Conf]
- Wu Liu, Hai-Xin Duan, Yong Feng, Yong-Bin Li, Ping Ren
Improved algorithms tracing back to attacking sources. [Citation Graph (0, 0)][DBLP] Parallel and Distributed Computing and Networks, 2004, pp:222-226 [Conf]
- Wu Liu, Hai-Xin Duan, Jian-Ping Wu, Xing Li
Improved Marking Model ERPPM Tracing Back to DDoS Attacker. [Citation Graph (0, 0)][DBLP] ICITA (2), 2005, pp:759-762 [Conf]
- Wu Liu, Jian-Ping Wu, Hai-Xin Duan, Xing Li
The Authorization Service in Dynamic Trust Domains. [Citation Graph (0, 0)][DBLP] ICITA (2), 2005, pp:564-567 [Conf]
- Yong-Bin Li, Wu Liu, Xiao-Lin Xiang
Geometry Theorem Proving by Decomposing Polynomial Systems into Strong Regular Sets. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2004, v:19, n:6, pp:820-827 [Journal]
Analysis of Anonymity in P2P Anonymous Communication Systems. [Citation Graph (, )][DBLP]
Decision of optimal scheduling scheme for gas field pipeline network based on hybrid genetic algorithm. [Citation Graph (, )][DBLP]
IABA: An improved PNN Algorithm for anomaly detection in network security management. [Citation Graph (, )][DBLP]
Text normalization in mandarin text-to-speech system. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|