Author of the publication

Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model.

, , , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 44-59. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Timing-Based Clone Detection on Android Markets., , , , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 375-381. Springer, (2014)Game-Theoretical Effectiveness Evaluation of DDoS Defense., and . ICN, page 427-433. IEEE Computer Society, (2008)A Lattice-Based Access Control Model for Social Networks., , , and . CyberC, page 54-61. IEEE, (2016)A novel vector edge sampling scheme for IP traceback against DDoS attacks., , , and . ICMLC, page 2829-2832. IEEE, (2010)一种社交网络Sybil用户检测方法 (Compound Approach for Sybil Users Detection in Social Networks)., , , and . 计算机科学, 43 (1): 172-177 (2016)VulLocator: Automatically Locating Vulnerable Code in Binary Programs., , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 295-308. Springer, (2013)Vulnerability-Based Backdoors: Threats from Two-step Trojans., , and . SERE, page 169-177. IEEE, (2013)AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability., , and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 140-154. Springer, (2011)Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model., , , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 44-59. Springer, (2013)Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis., , and . ICICS, volume 6476 of Lecture Notes in Computer Science, page 367-382. Springer, (2010)