2009 | ||
---|---|---|
46 | Jianhua Yang, Athula Ginige, Heinrich C. Mayr, Ralf-Detlef Kutsche: Information Systems: Modeling, Development, and Integration, Third International United Information Systems Conference, UNISCON 2009, Sydney, Australia, April 21-24, 2009. Proceedings Springer 2009 | |
45 | Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long Ni, Shou-Hsuan Stephen Huang: Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion. AINA 2009: 546-551 | |
44 | Yabo Liu, Jianhua Yang: A Ubiquitous and Cooperative Service Framework for Network Robot System. ICIRA 2009: 1-10 | |
43 | Bu-han Zhang, Junfang Li, Yan Li, Chengxiong Mao, Xin-bo Ruan, Jianhua Yang: Research on Multi-Agent Parallel Computing Model of Hydrothermal Economic Dispatch in Power System. ISNN (3) 2009: 1160-1170 | |
2008 | ||
42 | Jianhua Yang, Byong Lee, Stephen S. H. Huang: Monitoring Network Traffic to Detect Stepping-Stone Intrusion. AINA Workshops 2008: 56-61 | |
41 | Jianhua Yang, Byong Lee: Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. ATC 2008: 2-12 | |
40 | Jianhua Yang: Integrative Performance Evaluation for Strategic Supplier's under Supply Chain Management Based on Logarithm Triangular Fuzzy Number- AHP Method. FSKD (1) 2008: 311-315 | |
39 | Xi Chen, Gaogang Xie, Jianhua Yang: Mitigate DDoS attack using TTL buckets and host threatening index. LCN 2008: 525-526 | |
2007 | ||
38 | Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang: Stepping-Stone Detection Via Request-Response Traffic Analysis. ATC 2007: 276-285 | |
37 | Jianhua Yang, Ickjai Lee: Hybrid Clustering for Large Sequential Data. Artificial Intelligence and Pattern Recognition 2007: 76-81 | |
36 | Gaogang Xie, Ji Chen, Hongxia Zheng, Jianhua Yang, Yu Zhang: Handover Latency of MIPv6 Implementation in Linux. GLOBECOM 2007: 1780-1785 | |
35 | Dan Wang, Gaogang Xie, Jianhua Yang, Zhenyu Li, Wenjian Jiang: Feedback and Resources Guided Mechanism for Adaptive Packet Sampling. GLOBECOM 2007: 2586-2590 | |
34 | Gaogang Xie, Jianhua Yang, Valérie Issarny, Alberto Conte: An Accurate and Efficient 3-Phase Measurement Method for IP Traffic Flow on High Speed Link. ICN 2007: 46 | |
33 | Gaogang Xie, Guangxing Zhang, Jianhua Yang, Yinghua Min, Valérie Issarny, Alberto Conte: Survey on Traffic of Metro Area Network with Measurement On-Line. International Teletraffic Congress 2007: 666-677 | |
32 | Jianhua Yang: Fuzzy Integrative Performance Evaluation for Supply Chain System. SNPD (2) 2007: 47-52 | |
31 | Jianhua Yang: Schwarz type algorithms for parabolic problems. Applied Mathematics and Computation 188(1): 206-213 (2007) | |
30 | Jianhua Yang, Shou-Hsuan Stephen Huang: Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection. Computers & Security 26(2): 137-144 (2007) | |
29 | Jianhua Yang, Shou-Hsuan Stephen Huang: Mining TCP/IP packets to detect stepping-stone intrusion. Computers & Security 26(7-8): 479-484 (2007) | |
2006 | ||
28 | Jianhua Yang, Yongzhong Zhang: Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. ACNS 2006: 18-32 | |
27 | Jianhua Yang, Shou-Hsuan Stephen Huang, Ming Dong Wan: A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection. AINA (1) 2006: 231-236 | |
26 | Ming Dong Wan, Shou-Hsuan Stephen Huang, Jianhua Yang: Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection. AINA (1) 2006: 255-262 | |
25 | Yongzhong Zhang, Jianhua Yang, Chunming Ye: Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. ATC 2006: 477-486 | |
24 | Jianhua Yang, Ickjai Lee: Hybrid O(n Ön) Clustering for Sequential Web Usage Mining. Australian Conference on Artificial Intelligence 2006: 1022-1026 | |
23 | Jianhua Yang, Byong Lee, Yongzhong Zhang: Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. CANS 2006: 303-317 | |
22 | Yiyou Dong, Jianhua Yang, Zhaohui Wu: ODSG: An Architecture of Ontology-based Distributed Simulation on Grid. IMSCCS (1) 2006: 759-765 | |
21 | Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang: Resistance Analysis to Intruders' Evasion of Detecting Intrusion. ISC 2006: 383-397 | |
20 | Wenqi Liu, Jianhua Yang, Lei Wei: A Secure Threshold Proxy Signature Scheme for Mobile Agent-Based Electronic Commerce Transactions. PDCAT 2006: 454-459 | |
19 | Jianhua Yang, Di Jin, Ye Li, Kai-Steffen Jens Hielscher, Reinhard German: Modeling and simulation of performance analysis for a cluster-based Web server. Simulation Modelling Practice and Theory 14(2): 188-200 (2006) | |
2005 | ||
18 | Jianhua Yang, Shou-Hsuan Stephen Huang: Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet. AINA 2005: 1005-1010 | |
17 | Ickjai Lee, Jianhua Yang: Hybrid Agglomerative Clustering for Large Databases: An Efficient Interactivity Approach. Australian Conference on Artificial Intelligence 2005: 938-941 | |
16 | Ickjai Lee, Jianhua Yang: Voronoi-based Topological Information for Combining Partitioning and Hierarchical Clustering. CIMCA/IAWTIC 2005: 484-489 | |
15 | Jianhua Yang, Shou-Hsuan Stephen Huang: Improved Thumbprint and Its Application for Intrusion Detection. ICCNMC 2005: 433-442 | |
14 | Xiangguo Li, Jianhua Yang, Zhaohui Wu: An NFSv4-Based Security Scheme for NAS. ISPA Workshops 2005: 130-139 | |
13 | Jianhua Yang, Danping Yang: Additive Schwarz methods for parabolic problems. Applied Mathematics and Computation 163(1): 17-28 (2005) | |
12 | Qinglin Zhao, Li Feng, Zhongcheng Li, Jianhua Yang: Movement detection delay analysis in mobile IP. Computer Communications 28(5): 550-556 (2005) | |
2004 | ||
11 | Jianhua Yang, Zhaohui Wu, Siliang Tang, Xiaosheng Guo: Virtual Battlefield Attack-Defense Countermeasure Simulation on the Grid. GCC Workshops 2004: 164-172 | |
10 | Junrang Li, Zhaohui Wu, Jianhua Yang, Mingwang Xia: A Secure Model for Network-Attached Storage on the Grid. IEEE SCC 2004: 604-608 | |
9 | Jianhua Yang, Ickjai Lee: Cluster Validity Through Graph-based Boundary Analysis. IKE 2004: 204-210 | |
8 | Jianhua Yang, Wei Lu, Wenqi Liu: PID Controller Based on the Artificial Neural Network. ISNN (2) 2004: 144-149 | |
7 | Vladimir Estivill-Castro, Jianhua Yang: Fast and Robust General Purpose Clustering Algorithms. Data Min. Knowl. Discov. 8(2): 127-150 (2004) | |
2003 | ||
6 | Junfeng Wang, Jianhua Yang, Gaogang Xie, Mingtian Zhou, Zhongcheng Li: Measurement-Based Modeling with Adaptive Sampling. Asian Test Symposium 2003: 340-347 | |
5 | Vladimir Estivill-Castro, Jianhua Yang: Cluster Validity Using Support Vector Machines. DaWaK 2003: 244-256 | |
2002 | ||
4 | Vladimir Estivill-Castro, Jianhua Yang: Clustering Web Visitors by Fast, Robust and Convergent Algorithms. Int. J. Found. Comput. Sci. 13(4): 497-520 (2002) | |
2001 | ||
3 | Vladimir Estivill-Castro, Jianhua Yang: Non-crisp Clustering by Fast, Convergent, and Robust Algorithms. PKDD 2001: 103-114 | |
2 | Vladimir Estivill-Castro, Jianhua Yang: Categorizing Visitors Dynamically by Fast and Robust Clustering of Access Logs. Web Intelligence 2001: 498-507 | |
2000 | ||
1 | Vladimir Estivill-Castro, Jianhua Yang: Fast and Robust General Purpose Clustering Algorithms. PRICAI 2000: 208-218 |