Showing 1 - 20 results of 38 for search 'Bin Xing', query time: 0.02s
Refine Results
-
1
A hierarchy model on the research fields of cyberspace security technology by Bin-xing FANG
Published 2015-12-01
Article -
2
Target sampling based on routing behavior analysis in network topology measurement by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2009-01-01
Article -
3
Chinese IP-level network topology measurement and analysis by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2007-01-01
Article -
4
Approach to early detection and defense against internet worms by CHEN Bo, FANG Bin-xing, YUN Xiao-chun
Published 2007-01-01
Article -
5
-
6
Large scale network worm detection using automatic signature extraction by WANG Ping, FANG Bin-xing, YUN Xiao-chun
Published 2006-01-01
Article -
7
Data privacy preservation for the search of Internet of things based on fine-grained authorization by Jia-hui WANG, Chuan-yi LIU, Bin-xing FANG
Published 2017-01-01
Article -
8
Survey on data preserving for the search of internet of things by Jia-hui WANG, Chuan-yi LIU, Bin-xing FANG
Published 2016-09-01
Article -
9
A survey of firewall technology based on image content filtering by DONG Kai-kun, HU Ming-zeng, FANG Bin-xing
Published 2003-01-01
Article -
10
DDoS attacks detection based on link character by SUN Hong-jie, FANG Bin-xing, ZHANG Hong-li
Published 2007-01-01
Article -
11
-
12
Survey on the search of Internet of Things by Yun-quan GAO, Xiao-yong LI, Bin-xing FANG
Published 2015-12-01
Article -
13
Location privacy preservation approach towards to content sharing on mobile online social network by Chao LI, Li-hua YIN, Kui GENG, Bin-xing FANG
Published 2016-11-01
Article -
14
-
15
Hybrid-structured onion scheme against replay attack of MIX by SHI Jin-qiao, FANG Bin-xing, GUO Li, WANG Li-hong
Published 2009-01-01
Article -
16
Binary search on range of IPv6 prefix sets by Yu CUI, Zhi-hong TIAN, GHong-li ZHAN, Bin-xing FANG
Published 2013-06-01
Article -
17
User-habit based early warning of worm by WANG Ping, FANG Bin-xing, YUN Xiao-chun, PENG Da-wei
Published 2006-01-01
Article -
18
Mining characteristic clusters:a density estimation approach by Yi HAN, Bin-xing FANG, Yan JIA, Bin ZHOU, Wei-hong AN
Published 2012-05-01
Article -
19
Spectral-clustering-based abnormal permission assignments hunting framework by Liang FANG, Li-hua YIN, Feng-hua LI, Bin-xing FANG
Published 2017-12-01
Article -
20
Survey of software assurance by FANG Bin-xing1, LU Tian-bo2, LI Chao1
Published 2009-01-01
Article