Author of the publication

On User Interaction Behavior as Evidence for Computer Forensic Analysis.

, , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 221-231. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Guan, Xiaohong
add a person with the name Guan, Xiaohong
 

Other publications of authors with the same name

Energy-Efficient Buildings Facilitated by Microgrid., , and . IEEE Trans. Smart Grid, 1 (3): 243-252 (2010)A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense., , , and . IEEE Network, 23 (5): 22-29 (2009)Virtual indexing based methods for estimating node connection degrees., , , and . Computer Networks, 56 (12): 2773-2787 (2012)Modeling repeating behaviors in packet arrivals: Detection and measurement., , , , and . INFOCOM, page 2461-2469. IEEE, (2015)Modeling collective blogging dynamics of popular incidental topics., , and . Knowl. Inf. Syst., 31 (2): 371-387 (2012)Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data., , , and . Computers & Security, 25 (7): 539-550 (2006)An OVAL-based active vulnerability assessment system for enterprise computer networks., , and . Information Systems Frontiers, 10 (5): 573-588 (2008)Multi-view semi-supervised web image classification via co-graph., , , and . Neurocomputing, (2013)EV charging load scheduling following uncertain renewable energy supply by stochastic matching., , , , and . CASE, page 137-142. IEEE, (2014)A Novel IRC Botnet Detection Method Based on Packet Size Sequence., , , , , , and . ICC, page 1-5. IEEE, (2010)