Yuanbo Guo

According to our database1, Yuanbo Guo authored at least 24 papers between 2003 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
An Insider Threat Detection Method Based on Business Process Mining.
IJBDCN, 2017

2016
Business Process Mining based Insider Threat Detection System.
Proceedings of the Advances on P2P, 2016

2014
Partitioning OWL Knowledge Bases for Parallel Reasoning.
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014

2013
Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes.
IJDSN, 2013

2012
Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

TNC-eSA: An Echanced Security Access Solution to Office Networks.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

A TNC Protocol for 3GPP-WLAN Integrated Environment.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2008
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008

2007
A Requirements Driven Framework for Benchmarking Semantic Web Knowledge Base Systems.
IEEE Trans. Knowl. Data Eng., 2007

Document-Centric Query Answering for the Semantic Web.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

SSWS 2007 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

2006
Large Scale Knowledge Base Systems: An Empirical Evaluation Perspective.
Proceedings of the Proceedings, 2006

2005
LUBM: A benchmark for OWL knowledge base systems.
J. Web Sem., 2005

Rapid Benchmarking for Semantic Web Knowledge Base Systems.
Proceedings of the Semantic Web, 2005

On Logical Consequence for Collections of OWL Documents.
Proceedings of the Semantic Web, 2005

An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure.
Proceedings of the Computational Science, 2005

A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

2004
An efficient and secure fault-tolerant conference-key distribution scheme.
IEEE Trans. Consumer Electronics, 2004

An intrusion-tolerant authorization and authentication scheme in distributed environments.
Operating Systems Review, 2004

Practical Secret Sharing Scheme Realizing Generalized Adversary Structure.
J. Comput. Sci. Technol., 2004

Choosing the best knowledge base system for large semantic web applications.
Proceedings of the 13th international conference on World Wide Web, 2004

An Evaluation of Knowledge Base Systems for Large OWL Datasets.
Proceedings of the Semantic Web, 2004

An Initial Investigation into Querying an Untrustworthy and Inconsistent Web.
Proceedings of the ISWC*04 Workshop on Trust, 2004

2003
Benchmarking DAML+OIL Repositories.
Proceedings of the Semantic Web, 2003


  Loading...