Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Certificateless Signature from Pairings., , and . I. J. Network Security, 8 (1): 96-100 (2009)Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms., , and . Computers & Security, 28 (8): 827-842 (2009)Extending soft sets with description logics., , , , and . Computers & Mathematics with Applications, 59 (6): 2087-2096 (2010)An Automated Signature-Based Approach against Polymorphic Internet Worms., and . IEEE Trans. Parallel Distrib. Syst., 18 (7): 879-892 (2007)A novel model on dynamic resource allocation in optical networks., , , , , , and . Science in China Series F: Information Sciences, 48 (1): 15-27 (2005)Study and application of temporal index technology., , , , , and . Science in China Series F: Information Sciences, 52 (6): 899-913 (2009)An interval type-2 fuzzy model of computing with words., and . Inf. Sci., (2014)Defending against Internet worms: a signature-based approach., and . INFOCOM, page 1384-1394. IEEE, (2005)Interference Aware Adaptive Clear Channel Assessment for improving ZigBee packet transmission under Wi-Fi interference., , , and . SECON, page 336-343. IEEE, (2013)HonIDS: Enhancing Honeypot System with Intrusion Detection Models., , , and . IWIA, page 135-143. IEEE Computer Society, (2006)