BibTeX records: Gaofeng Da

download as .bib file

@article{DBLP:journals/ress/ZhangXDZ21,
  author       = {Xiaoyu Zhang and
                  Maochao Xu and
                  Gaofeng Da and
                  Peng Zhao},
  title        = {Ensuring confidentiality and availability of sensitive data over a
                  network system under cyber threats},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {214},
  pages        = {107697},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ress.2021.107697},
  doi          = {10.1016/J.RESS.2021.107697},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/ZhangXDZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-16092,
  author       = {Gaofeng Da and
                  Maochao Xu and
                  Jingshi Zhang and
                  Peng Zhao},
  title        = {Joint Cyber Risk Assessment of Network Systems with Heterogeneous
                  Components},
  journal      = {CoRR},
  volume       = {abs/2006.16092},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.16092},
  eprinttype    = {arXiv},
  eprint       = {2006.16092},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-16092.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/DaXZ19,
  author       = {Gaofeng Da and
                  Maochao Xu and
                  Peng Zhao},
  title        = {Modeling Network Systems Under Simultaneous Cyber-Attacks},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {68},
  number       = {3},
  pages        = {971--984},
  year         = {2019},
  url          = {https://doi.org/10.1109/TR.2019.2911106},
  doi          = {10.1109/TR.2019.2911106},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/DaXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/DaCX18,
  author       = {Gaofeng Da and
                  Ping Shing Chan and
                  Maochao Xu},
  title        = {On the signature of complex system: {A} decomposed approach},
  journal      = {Eur. J. Oper. Res.},
  volume       = {265},
  number       = {3},
  pages        = {1115--1123},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ejor.2017.08.052},
  doi          = {10.1016/J.EJOR.2017.08.052},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eor/DaCX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/DaD16,
  author       = {Gaofeng Da and
                  Weiyong Ding},
  title        = {Component Level Versus System Level k-Out-of-n Assembly Systems},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {65},
  number       = {1},
  pages        = {425--433},
  year         = {2016},
  url          = {https://doi.org/10.1109/TR.2015.2421902},
  doi          = {10.1109/TR.2015.2421902},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/DaD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DaXX16,
  author       = {Gaofeng Da and
                  Maochao Xu and
                  Shouhuai Xu},
  title        = {A New Approach to Modeling and Analyzing Security of Networked Systems},
  journal      = {CoRR},
  volume       = {abs/1603.08305},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.08305},
  eprinttype    = {arXiv},
  eprint       = {1603.08305},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DaXX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/XuDX16,
  author       = {Maochao Xu and
                  Gaofeng Da and
                  Shouhuai Xu},
  title        = {Cyber Epidemic Models with Dependences},
  journal      = {CoRR},
  volume       = {abs/1603.08307},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.08307},
  eprinttype    = {arXiv},
  eprint       = {1603.08307},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/XuDX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/im/XuDX15,
  author       = {Maochao Xu and
                  Gaofeng Da and
                  Shouhuai Xu},
  title        = {Cyber Epidemic Models with Dependences},
  journal      = {Internet Math.},
  volume       = {11},
  number       = {1},
  pages        = {62--92},
  year         = {2015},
  url          = {https://doi.org/10.1080/15427951.2014.902407},
  doi          = {10.1080/15427951.2014.902407},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/im/XuDX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ma/DaXB14,
  author       = {Gaofeng Da and
                  Maochao Xu and
                  N. Balakrishnan},
  title        = {On the Lorenz ordering of order statistics from exponential populations
                  and some applications},
  journal      = {J. Multivar. Anal.},
  volume       = {127},
  pages        = {88--97},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jmva.2014.02.005},
  doi          = {10.1016/J.JMVA.2014.02.005},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ma/DaXB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/DaXX14,
  author       = {Gaofeng Da and
                  Maochao Xu and
                  Shouhuai Xu},
  editor       = {Laurie A. Williams and
                  David M. Nicol and
                  Munindar P. Singh},
  title        = {A new approach to modeling and analyzing security of networked systems},
  booktitle    = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600176.2600184},
  doi          = {10.1145/2600176.2600184},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/DaXX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ma/DingDZ13,
  author       = {Weiyong Ding and
                  Gaofeng Da and
                  Peng Zhao},
  title        = {On sample ranges from two sets of heterogenous random variables},
  journal      = {J. Multivar. Anal.},
  volume       = {116},
  pages        = {63--73},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jmva.2012.11.009},
  doi          = {10.1016/J.JMVA.2012.11.009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ma/DingDZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ma/DaZH12,
  author       = {Gaofeng Da and
                  Ben Zheng and
                  Taizhong Hu},
  title        = {On computing signatures of coherent systems},
  journal      = {J. Multivar. Anal.},
  volume       = {103},
  number       = {1},
  pages        = {142--150},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jmva.2011.06.015},
  doi          = {10.1016/J.JMVA.2011.06.015},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ma/DaZH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ma/LiD10,
  author       = {Xiaohu Li and
                  Gaofeng Da},
  title        = {Stochastic comparisons in multivariate mixed model of proportional
                  reversed hazard rate with applications},
  journal      = {J. Multivar. Anal.},
  volume       = {101},
  number       = {4},
  pages        = {1016--1025},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.jmva.2009.09.015},
  doi          = {10.1016/J.JMVA.2009.09.015},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ma/LiD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics