Showing 1 - 16 results of 16 for search 'FANG Bin-xing', query time: 0.02s
Refine Results
-
1
Target sampling based on routing behavior analysis in network topology measurement by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2009-01-01Get full text
Article -
2
DDoS attacks detection based on link character by SUN Hong-jie, FANG Bin-xing, ZHANG Hong-li
Published 2007-01-01Get full text
Article -
3
A survey of firewall technology based on image content filtering by DONG Kai-kun, HU Ming-zeng, FANG Bin-xing
Published 2003-01-01Get full text
Article -
4
Survey of software assurance by FANG Bin-xing1, LU Tian-bo2, LI Chao1
Published 2009-01-01Get full text
Article -
5
Hybrid-structured onion scheme against replay attack of MIX by SHI Jin-qiao, FANG Bin-xing, GUO Li, WANG Li-hong
Published 2009-01-01Get full text
Article -
6
User-habit based early warning of worm by WANG Ping, FANG Bin-xing, YUN Xiao-chun, PENG Da-wei
Published 2006-01-01Get full text
Article -
7
Survey of software assurance by FANG Bin-xing1, LU Tian-bo2, LI Chao1
Published 2009-01-01Get full text
Article -
8
Real-time anomaly detection model for worm mails in high-speed network by LUO Hao, FANG Bin-xing, YUN Xiao-chun, WANG Xin, XIN Yi
Published 2006-01-01Get full text
Article -
9
Spam filtering algorithm based on geographic E-mail path analysis by ZHANG Ni1, JIANG Yu2, FANG Bin-xing1, LI Guo1
Published 2007-01-01Get full text
Article -
10
Spam filtering algorithm based on geographic E-mail path analysis by ZHANG Ni1, JIANG Yu2, FANG Bin-xing1, LI Guo1
Published 2007-01-01Get full text
Article -
11
Safe communicated model of SIP network based on improved SIP protocol by ZHANG Zhao-xin1, FANG Bin-xing1, ZHANG Hong-li1, JIANG Chun-xiang2
Published 2007-01-01Get full text
Article -
12
HitIct:Chinese corpus for the evaluation of lossless compression algorithms by CHANG Wei-ling1, YUN Xiao-chun2, FANG Bin-xing1, WANG Shu-peng2
Published 2009-01-01Get full text
Article -
13
HitIct:Chinese corpus for the evaluation of lossless compression algorithms by CHANG Wei-ling1, YUN Xiao-chun2, FANG Bin-xing1, WANG Shu-peng2
Published 2009-01-01Get full text
Article -
14
TPCAD:a text-oriented multi-protocol inference approach by ZHAO Yong1, YAO Qiu-lin1, ZHANG Zhi-bin1, GUO Li1, FANG Bin-xing1
Published 2009-01-01Get full text
Article -
15
TPCAD:a text-oriented multi-protocol inference approach by ZHAO Yong1, YAO Qiu-lin1, ZHANG Zhi-bin1, GUO Li1, FANG Bin-xing1
Published 2009-01-01Get full text
Article -
16
Worm detection and signature extraction based on communication characteristics by XIN Yi1, FANG Bin-xing1, HE Long-tao2, YUN Xiao-chun2, LI Zhi-dong1
Published 2007-01-01Get full text
Article