Jingping Song

Orcid: 0000-0001-8206-9455

According to our database1, Jingping Song authored at least 20 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Comparative Analysis of Threat Modelling Methods: STRIDE, DREAD, VAST, PASTA, OCTAVE, and LINDDUN.
Proceedings of the Contributions Presented at The International Conference on Computing, 2024

An Introduction to Threat Modelling: Modelling Steps, Model Types, Benefits and Challenges.
Proceedings of the Contributions Presented at The International Conference on Computing, 2024

Understanding the Defence of Operational Technology (OT) Systems: A Comparison of Lockheed Martin's Cyber Kill Chain, MITRE ATT&CK Framework, and Diamond Model.
Proceedings of the Contributions Presented at The International Conference on Computing, 2024

2023
Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack.
Proceedings of the Advances in Computational Intelligence Systems, 2023

Analysing Cyberattacks Using Attack Tree and Fuzzy Rules.
Proceedings of the Advances in Computational Intelligence Systems, 2023

2022
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity.
Comput. Secur., 2022

2020
Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020

2019
Augmented YARA Rules Fused With Fuzzy Hashing in Ransomware Triaging.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Improved Collaborative Filtering Algorithm Based on Stacked Denoising AutoEncoders.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

2016
Feature selection for intrusion detection system.
PhD thesis, 2016

2014
Modified Mutual Information-based Feature Selection for Intrusion Detection Systems in Decision Tree Learning.
J. Comput., 2014

A Multiaddress Co-Chaos Shift Keying Communication Scheme and Performance Analysis.
Int. J. Bifurc. Chaos, 2014

Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
CARDINAL-E: AIS Extensions to CARDINAL for Decentralised Self-Organisation for Network Security.
Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, 2013

Selecting Features for Anomaly Intrusion Detection: A Novel Method using Fuzzy C Means and Decision Tree Classification.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2009
Multi-objective optimization for coverage control in wireless sensor network with adjustable sensing radius.
Comput. Math. Appl., 2009

Research and Implementation of Embedded Intelligent Network Self-Healing Equipment Based on E1 Link.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2008
Research and Analysis of Securities Market based on Multi-Fractal Generator.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...