Showing 1 - 20 results of 37 for search 'Bin Xing', query time: 0.02s
Refine Results
-
1
A hierarchy model on the research fields of cyberspace security technology by Bin-xing FANG
Published 2015-12-01Get full text
Article -
2
Target sampling based on routing behavior analysis in network topology measurement by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2009-01-01Get full text
Article -
3
Data privacy preservation for the search of Internet of things based on fine-grained authorization by Jia-hui WANG, Chuan-yi LIU, Bin-xing FANG
Published 2017-01-01Get full text
Article -
4
DDoS attacks detection based on link character by SUN Hong-jie, FANG Bin-xing, ZHANG Hong-li
Published 2007-01-01Get full text
Article -
5
A survey of firewall technology based on image content filtering by DONG Kai-kun, HU Ming-zeng, FANG Bin-xing
Published 2003-01-01Get full text
Article -
6
Survey on the search of Internet of Things by Yun-quan GAO, Xiao-yong LI, Bin-xing FANG
Published 2015-12-01Get full text
Article -
7
Location privacy preservation approach towards to content sharing on mobile online social network by Chao LI, Li-hua YIN, Kui GENG, Bin-xing FANG
Published 2016-11-01Get full text
Article -
8
-
9
Survey of software assurance by FANG Bin-xing1, LU Tian-bo2, LI Chao1
Published 2009-01-01Get full text
Article -
10
Hybrid-structured onion scheme against replay attack of MIX by SHI Jin-qiao, FANG Bin-xing, GUO Li, WANG Li-hong
Published 2009-01-01Get full text
Article -
11
Binary search on range of IPv6 prefix sets by Yu CUI, Zhi-hong TIAN, GHong-li ZHAN, Bin-xing FANG
Published 2013-06-01Get full text
Article -
12
Binary search on range of IPv6 prefix sets by Yu CUI, Zhi-hong TIAN, GHong-li ZHAN, Bin-xing FANG
Published 2013-06-01Get full text
Article -
13
User-habit based early warning of worm by WANG Ping, FANG Bin-xing, YUN Xiao-chun, PENG Da-wei
Published 2006-01-01Get full text
Article -
14
Spectral-clustering-based abnormal permission assignments hunting framework by Liang FANG, Li-hua YIN, Feng-hua LI, Bin-xing FANG
Published 2017-12-01Get full text
Article -
15
Survey of software assurance by FANG Bin-xing1, LU Tian-bo2, LI Chao1
Published 2009-01-01Get full text
Article -
16
Real-time anomaly detection model for worm mails in high-speed network by LUO Hao, FANG Bin-xing, YUN Xiao-chun, WANG Xin, XIN Yi
Published 2006-01-01Get full text
Article -
17
Research on architecture and algorithm for code resolution system in the internet of things by Hai-ning YU, Hong-li ZHANG, Bin-xing FANG, Xiang-zhan YU
Published 2012-11-01Get full text
Article -
18
Research towards IoT-oriented universal control system security model by Jin-cui YANG, Bin-xing FANG, Li-dong ZHAI, Fang-jiao ZHANG
Published 2012-11-01Get full text
Article -
19
Research on Webshell-based botnet by Ke LI, Bin-xing FANG, Xiang CUI, Qi-xu LIU, Zhi-tao YAN
Published 2016-06-01Get full text
Article -
20
Spam filtering algorithm based on geographic E-mail path analysis by ZHANG Ni1, JIANG Yu2, FANG Bin-xing1, LI Guo1
Published 2007-01-01Get full text
Article