Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2007 Issue 12
Investigation on the botnets activities
HAN Xin-hui;GUO Jin-peng;ZHOU Yong-lin;ZHUGE Jian-wei;ZOU Wei
..............page:167-172
Network anomaly detection based on TCM-KNN and genetic algorithm
LI Yang;FANG Bin-xing;GUO Li;TIAN Zhi-hong;ZHANG Yong-zheng;JIANG Wei
..............page:48-52
Safe communicated model of SIP network based on improved SIP protocol
ZHANG Zhao-xin;FANG Bin-xing;ZHANG Hong-li;JIANG Chun-xiang
..............page:39-47
Research on a dynamic self-learning efficient intrusion detection model
YANG Wu;ZHANG Bing;ZHOU Yuan;WANG Wei
..............page:33-38
Reconstruction of BLP model based on secure subject access
LIU Ke-long;DING Li
..............page:25-32
Research on dynamic routing mechanism in network simulation
HAO Zhi-yu;ZHAI Jian-hong;YUN Xiao-chun;ZHANG Hong-li
..............page:19-24
Port scan detection algorithms based on statistical traffic features
WANG Ping-hui;ZHENG Qing-hua;NIU Guo-lin;GUAN Xiao-hong;CAI Zhong-min
..............page:14-18
HoneyBow: an automated malware collection tool based on the high-interaction honeypot principle
ZHUGE Jian-wei;HAN Xin-hui;ZHOU Yong-lin;SONG Cheng-yu;GUO Jin-peng;ZOU Wei
..............page:8-13
Worm detection and signature extraction based on communication characteristics
XIN Yi;FANG Bin-xing;HE Long-tao;YUN Xiao-chun;LI Zhi-dong
..............page:1-7
Frequent-pattern discovering algorithm for large-scale corpus
GONG Cai-chun;HE Min;CHEN Hai-qiang;XU Hong-bo;CHENG Xue-qi
..............page:161-166
Study on the classification and identification of Blog pages
ZHENG De-quan;ZHANG Di;ZHAO Tie-jun;YU Hao
..............page:156-160
Technologies of network audio retrieval
ZHANG Wei-qiang;LIU Jia
..............page:152-155
Video matching method based on "bag of words"
LI Yuan-ning;LIU Ting;JIANG Shu-qiang;HUANG Qing-ming
..............page:147-151
Research on Internet hotspot information detection
ZENG Yi-ling;XU Hong-bo
..............page:141-146
Text steganalysis using AdaBoost
SUI Xin-guang;SHEN Lei;YAN Ji-kun;ZHU Zhong-liang
..............page:136-140,146
Keyword spotting system for broadcast news
ZHANG Peng-yuan;SHAO Jian;ZHAO Qing-wei;YAN Yong-hong
..............page:131-135
Research on ordered Boolean expression matching with window
CAO Jing;LIU Yan-bing;LIU Ping;TAN Jian-long;GUO Li
..............page:125-130
Independent semantic feature extraction algorithm based on short text
HU Jia-ni;GUO Jun;DENG Wei-hong;XU Wei-ran
..............page:121-124
Text detection based on stroke features
WANG Wei-qiang;FU Li-bo;GAO Wen;HUANG Qing-ming;JIANG Shu-qiang
..............page:116-120
Research on MIX-based anonymous communications
LU Tian-bo;CHENG Xiao-ming;ZHANG Bing
..............page:108-115
Research of survivability enhancement algorithm based on autonomous configuration
ZHANG Le-jun;ZHOU Yuan;GUO Lin;WANG Wei;YANG Yong-tian
..............page:102-107
Chinese IP-level network topology measurement and analysis
ZHANG Yu;FANG Bin-xing;ZHANG Hong-li
..............page:96-101
Spam filtering algorithm based on geographic E-mail path analysis
ZHANG Ni;JIANG Yu;FANG Bin-xing;LI Guo
..............page:90-95
Discrete propagation model of CDC-based benign worms
LIU Yong;ZHOU Han-sun;LIU Tie;SUN Dong-hong
..............page:85-89
Attack scenarios reasoning, hypothesizing and predicting based on capability transition model
TIAN Zhi-hong;ZHANG Wei-zhe;ZHANG Yong-zheng;ZHANG Hong-li;LI Yang;JIANG Wei
..............page:78-84
Research of worm-propagation prediction based on stochastic experiment
LIU Ting;ZHENG Qin-hua;GUAN Xiao-hong;QU Yu;WANG Na
..............page:72-77
Research and implement on segmenting storage model of netflow
WU Guang-jun;YUN Xiao-chun;YU Xiang-zhan;WANG Shu-peng
..............page:66-71
Method of detecting network anomaly on multi-time-scale
WANG Feng-yu;YUN Xiao-chun;CAO Zhen-zhong
..............page:60-65