Chunhe Xia

According to our database1, Chunhe Xia authored at least 45 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks.
IEEE Trans. Dependable Sec. Comput., 2019

2018
Coordinated scan detection algorithm based on the global characteristics of time sequence.
IJCSE, 2018

Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications.
Future Generation Comp. Syst., 2018

H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms.
IEEE Trans. Information Forensics and Security, 2017

On the satisfiability of authorization requirements in business process.
Frontiers Comput. Sci., 2017

A Dynamic Placement Policy of Virtual Machine Based on MOGA in Cloud Environment.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

An Attack-oriented Task Execution Collaborative Defense Protocol.
Proceedings of the 12th Chinese Conference on Computer Supported Cooperative Work and Social Computing, 2017

CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

2015
Modeling, conflict detection, and verification of a new virtualization role-based access control framework.
Security and Communication Networks, 2015

An Interval Algebra-based Modeling and Routing Method in Bus Delay Tolerant Network.
TIIS, 2015

The Temporal Characteristic of Human Mobility: Modeling and Analysis of Social Worm Propagation.
IEEE Communications Letters, 2015

A Method of Network Security Situation Assessment Based on Hidden Markov Model.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

2014
An Approach for Description of Computer Network Defense Scheme and Its Simulation Verification.
JCP, 2014

Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage.
Proceedings of the Trusted Systems - 6th International Conference, 2014

An automated method of penetration testing.
Proceedings of the IEEE Computers, 2014

Detecting Compromised VM via Application-Aware Anomaly Detection.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Coordinated Scan Detection Algorithm Based on the Global Characteristics of Time Sequence.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Automatic Generation Algorithm of Penetration Graph in Penetration Testing.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Static Compliance Checking beyond Separation of Duty Constraints.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Co-segmentation of 3D shapes via multi-view spectral clustering.
The Visual Computer, 2013

On the Spatial-temporal Reachability of DTNs.
Proceedings of the Frontiers in Internet Technologies, 2013

A Computer Network Defense Policy Refinement Method.
Proceedings of the Frontiers in Internet Technologies, 2013

VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach.
Proceedings of the Frontiers in Internet Technologies, 2013

A Conflict-Related Rules Detection Tool for Access Control Policy.
Proceedings of the Frontiers in Internet Technologies, 2013

A Verification Method of Enterprise Network Reachability Based on Topology Path.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

A Botnet-Oriented Collaborative Defense Scheme Description Language.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

Optimal Service Selection Based on Business for Cloud Computing.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013

2012
Semantic Similarity Analysis between High-Level Model Description Text and Low-Level Implementation Text for Network Survivability.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Characterization and modeling in large-scale urban DTNs.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

On the distribution of inter contact time for DTNs.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

2011
Design and Implementation of Bus Net Routing Algorithm.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
A Tactical Intelligence Production Model of Computer Network Self-Organizing Operations.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2010

Application for Artificial Bee Colony Algorithm in Migration of Mobile Agent.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010

2009
An Evaluation Model of CNO Intelligence Information Confidence.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

A Bulk Email Oriented Multi-party Non-repudiation Exchange Protocol.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

2008
A New Type of Self-Adaptive Mechanism for Network Survivability Based on Intrusion Deception.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A Network Security Risk Assessment Framework Based on Game Theory.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Research on Survivability of Mobile Ad Hoc Network.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

An Algorithm for Generation of Attack Signatures Based on Sequences Alignment.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
P2P worm detection based on application identification.
Frontiers Comput. Sci. China, 2007

Research on Simulation Framework of Structured P2P Network.
Proceedings of the Future Generation Communication and Networking, 2007

2006
A Non-Repudiation Protocol for E-Mail and Its Formal Analysis.
Journal of Computer Research and Development, 2006


  Loading...