Yao Li

According to our database1, Yao Li authored at least 9 papers between 2005 and 2010.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2010
A novel technique of recognising multi-stage attack behaviour.
IJHPCN, 2010

2007
A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS.
Proceedings of the International Conference on Networking, 2007

2006
A Fuzzy Anomaly Detection Algorithm for IPv6.
Proceedings of the 2006 International Conference on Semantics, 2006

Storage challenge - HUSt: a heterogeneous unified storage system for GIS grid.
Proceedings of the ACM/IEEE SC2006 Conference on High Performance Networking and Computing, 2006

Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function.
Proceedings of the Intelligent Computing, 2006

A novel algorithm SF for mining attack scenarios model.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

2005
An Image Hiding Method Based on Correlation Analysis and Image Fusion.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Dynamic immune intrusion detection system for IPv6.
Proceedings of the Data Mining, 2005

Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...