Showing 1 - 17 results of 17 for search 'FANG Bin-xing', query time: 0.01s
Refine Results
-
1
Target sampling based on routing behavior analysis in network topology measurement by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2009-01-01
Article -
2
Chinese IP-level network topology measurement and analysis by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2007-01-01
Article -
3
Approach to early detection and defense against internet worms by CHEN Bo, FANG Bin-xing, YUN Xiao-chun
Published 2007-01-01
Article -
4
Large scale network worm detection using automatic signature extraction by WANG Ping, FANG Bin-xing, YUN Xiao-chun
Published 2006-01-01
Article -
5
A survey of firewall technology based on image content filtering by DONG Kai-kun, HU Ming-zeng, FANG Bin-xing
Published 2003-01-01
Article -
6
DDoS attacks detection based on link character by SUN Hong-jie, FANG Bin-xing, ZHANG Hong-li
Published 2007-01-01
Article -
7
Hybrid-structured onion scheme against replay attack of MIX by SHI Jin-qiao, FANG Bin-xing, GUO Li, WANG Li-hong
Published 2009-01-01
Article -
8
User-habit based early warning of worm by WANG Ping, FANG Bin-xing, YUN Xiao-chun, PENG Da-wei
Published 2006-01-01
Article -
9
Survey of software assurance by FANG Bin-xing1, LU Tian-bo2, LI Chao1
Published 2009-01-01
Article -
10
Approach for topology partitioning in parallel network simulation by WANG Xiao-feng, FANG Bin-xing, YUN Xiao-chun, ZHANG Hong-li
Published 2006-01-01
Article -
11
Real-time anomaly detection model for worm mails in high-speed network by LUO Hao, FANG Bin-xing, YUN Xiao-chun, WANG Xin, XIN Yi
Published 2006-01-01
Article -
12
Spam filtering algorithm based on geographic E-mail path analysis by ZHANG Ni1, JIANG Yu2, FANG Bin-xing1, LI Guo1
Published 2007-01-01
Article -
13
Safe communicated model of SIP network based on improved SIP protocol by ZHANG Zhao-xin1, FANG Bin-xing1, ZHANG Hong-li1, JIANG Chun-xiang2
Published 2007-01-01
Article -
14
HitIct:Chinese corpus for the evaluation of lossless compression algorithms by CHANG Wei-ling1, YUN Xiao-chun2, FANG Bin-xing1, WANG Shu-peng2
Published 2009-01-01
Article -
15
TPCAD:a text-oriented multi-protocol inference approach by ZHAO Yong1, YAO Qiu-lin1, ZHANG Zhi-bin1, GUO Li1, FANG Bin-xing1
Published 2009-01-01
Article -
16
Worm detection and signature extraction based on communication characteristics by XIN Yi1, FANG Bin-xing1, HE Long-tao2, YUN Xiao-chun2, LI Zhi-dong1
Published 2007-01-01
Article -
17
Network anomaly detection based on TCM-KNN and genetic algorithm by LI Yang1, FANG Bin-xing1, GUO Li1, TIAN Zhi-hong1, ZHANG Yong-zheng1, JIANG Wei1
Published 2007-01-01
Article