Showing 1 - 19 results of 19 for search 'YUN Xiao-chun', query time: 0.03s
Refine Results
-
1
Approach to early detection and defense against internet worms by CHEN Bo, FANG Bin-xing, YUN Xiao-chun
Published 2007-01-01
Article -
2
Large scale network worm detection using automatic signature extraction by WANG Ping, FANG Bin-xing, YUN Xiao-chun
Published 2006-01-01
Article -
3
Research on multi-objective grid task scheduling algorithms based on survivability and Makespan by WANG Shu-peng, YUN Xiao-chun, YU Xiang-zhan
Published 2006-01-01
Article -
4
Approach to remote routing computation and lookup in parallel network simulation by HAO Zhi-yu, YUN Xiao-chun, ZHANG Hong-li
Published 2007-01-01
Article -
5
Network-based malcode detection technology by WU Bing1, YUN Xiao-chun2, GAO Qi1
Published 2007-01-01
Article -
6
Anomaly detection of large scale network based on data streams by ZHENG Jun, HU Ming-zeng, YUN Xiao-chun, ZHENG Zhong
Published 2006-01-01
Article -
7
User-habit based early warning of worm by WANG Ping, FANG Bin-xing, YUN Xiao-chun, PENG Da-wei
Published 2006-01-01
Article -
8
Network latency clustering for detector placement on macroscopical prewarning by HE Hui, HU Ming-zeng, YUN Xiao-chun, ZHANG Hong-li
Published 2006-01-01
Article -
9
Approach for topology partitioning in parallel network simulation by WANG Xiao-feng, FANG Bin-xing, YUN Xiao-chun, ZHANG Hong-li
Published 2006-01-01
Article -
10
Real-time anomaly detection model for worm mails in high-speed network by LUO Hao, FANG Bin-xing, YUN Xiao-chun, WANG Xin, XIN Yi
Published 2006-01-01
Article -
11
Research on dynamic routing mechanism in network simulation by HAO Zhi-yu, ZHAI Jian-hong, YUN Xiao-chun, ZHANG Hong-li
Published 2007-01-01
Article -
12
Method of detecting network anomaly on multi-time-scale by WANG Feng-yu1, YUN Xiao-chun1, CAO Zhen-zhong4
Published 2007-01-01
Article -
13
Research on DNS authoritative server’s performance and security by WANG Yao, HU Ming-zeng, YUN Xiao-chun, LI Bin, YAN Bo-ru
Published 2006-01-01
Article -
14
HitIct:Chinese corpus for the evaluation of lossless compression algorithms by CHANG Wei-ling1, YUN Xiao-chun2, FANG Bin-xing1, WANG Shu-peng2
Published 2009-01-01
Article -
15
Research and implement on segmenting storage model of netflow by WU Guang-jun1, YUN Xiao-chun2, YU Xiang-zhan1, WANG Shu-peng2
Published 2007-01-01
Article -
16
Multi-version consolidation method for block-level backup data by WANG Shu-peng 1, WU Guang-jun1, WU Zhi-gang3, YUN Xiao-chun1
Published 2011-01-01
Article -
17
Botnets’ similarity analysis based on communication features and D-S evidence theory by ZANG Tian-ning1, YUN Xiao-chun1, ZHANG Yong-zheng2, MEN Chao-guang1, CUI Xiang2
Published 2011-01-01
Article -
18
Worm detection and signature extraction based on communication characteristics by XIN Yi1, FANG Bin-xing1, HE Long-tao2, YUN Xiao-chun2, LI Zhi-dong1
Published 2007-01-01
Article -
19
Trust-driven job scheduling heuristics for computing grid by ZHANG Wei-zhe1, LIU Xin-ran2, YUN Xiao-chun1, ZHANG Hong-li1, HU Ming-zeng1, LIU Kai-peng1
Published 2006-01-01
Article