Wenjun Fan

According to our database1, Wenjun Fan authored at least 19 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A cloud-edge based data security architecture for sharing and analysing cyber threat information.
Future Gener. Comput. Syst., 2020

Blockchain-enabled Collaborative Intrusion Detection in Software Defined Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Voting Credential Management System for Electronic Voting Privacy.
Proceedings of the 2020 IFIP Networking Conference, 2020

Optimizing Social Welfare for Task Offloading in Mobile Edge Computing.
Proceedings of the 2020 IFIP Networking Conference, 2020

Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design.
IEEE J. Sel. Areas Commun., 2019

Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

2018
Enabling an Anatomic View to Investigate Honeypot Systems: A Survey.
IEEE Syst. J., 2018

2017
Versatile virtual honeynet management framework.
IET Inf. Secur., 2017

A novel SDN based stealthy TCP connection handover mechanism for hybrid honeypot systems.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

An architecture for privacy-preserving sharing of CTI with 3<sup>rd</sup> party analysis services.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

2015
Adaptive and Flexible Virtual Honeynet.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

Technology Independent Honeynet Description Language.
Proceedings of the MODELSWARD 2015, 2015

Dynamic Hybrid Honeypot System Based Transparent Traffic Redirection Mechanism.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2013
Priori information and sliding window based prediction algorithm for energy-efficient storage systems in cloud.
Simul. Model. Pract. Theory, 2013

Three-state disk model for high quality and energy efficient streaming media servers.
Proceedings of the 11th International Symposium on Autonomous Decentralized Systems, 2013

Using end-to-end data encryption to secure SIP device configuration.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

2010
A New Automatic Train Identification System Based on RFID.
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010

Parallelization of RSA Algorithm Based on Compute Unified Device Architecture.
Proceedings of the GCC 2010, 2010


  Loading...