Feng Chen

Affiliations:
  • National University of Defense Technology, Changsha, China


According to our database1, Feng Chen authored at least 11 papers between 2008 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Controlling the Spreads of Infectious Disease and Scare via Utilizing Location and Social Networking Information.
Proceedings of the 2015 Workshop on Mobile Big Data, 2015

2011
DBMISD-D: A distributed algorithm for constructing and maintaining high stability application-layer multicast tree.
Comput. Syst. Sci. Eng., 2011

2010
A Scalable Approach to Analyzing Network Security using Compact Attack Graphs.
J. Networks, 2010

Towards Global State Identification of Nodes in DHT Based Systems.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

DSD-D: A Distributed Algorithm for Constructing High-Stability Application-Layer Multicast Tree.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

2009
Network Access Control Mechanism Based on Locator/Identifier Split.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

A Scalable Approach to Full Attack Graphs Generation.
Proceedings of the Engineering Secure Software and Systems, 2009

2008
A Flexible Approach to Measuring Network Security Using Attack Graphs.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008


  Loading...