Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Gaofeng Da
@article{DBLP:journals/ress/ZhangXDZ21, author = {Xiaoyu Zhang and Maochao Xu and Gaofeng Da and Peng Zhao}, title = {Ensuring confidentiality and availability of sensitive data over a network system under cyber threats}, journal = {Reliab. Eng. Syst. Saf.}, volume = {214}, pages = {107697}, year = {2021}, url = {https://doi.org/10.1016/j.ress.2021.107697}, doi = {10.1016/J.RESS.2021.107697}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/ZhangXDZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-16092, author = {Gaofeng Da and Maochao Xu and Jingshi Zhang and Peng Zhao}, title = {Joint Cyber Risk Assessment of Network Systems with Heterogeneous Components}, journal = {CoRR}, volume = {abs/2006.16092}, year = {2020}, url = {https://arxiv.org/abs/2006.16092}, eprinttype = {arXiv}, eprint = {2006.16092}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-16092.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/DaXZ19, author = {Gaofeng Da and Maochao Xu and Peng Zhao}, title = {Modeling Network Systems Under Simultaneous Cyber-Attacks}, journal = {{IEEE} Trans. Reliab.}, volume = {68}, number = {3}, pages = {971--984}, year = {2019}, url = {https://doi.org/10.1109/TR.2019.2911106}, doi = {10.1109/TR.2019.2911106}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/DaXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/DaCX18, author = {Gaofeng Da and Ping Shing Chan and Maochao Xu}, title = {On the signature of complex system: {A} decomposed approach}, journal = {Eur. J. Oper. Res.}, volume = {265}, number = {3}, pages = {1115--1123}, year = {2018}, url = {https://doi.org/10.1016/j.ejor.2017.08.052}, doi = {10.1016/J.EJOR.2017.08.052}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eor/DaCX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/DaD16, author = {Gaofeng Da and Weiyong Ding}, title = {Component Level Versus System Level k-Out-of-n Assembly Systems}, journal = {{IEEE} Trans. Reliab.}, volume = {65}, number = {1}, pages = {425--433}, year = {2016}, url = {https://doi.org/10.1109/TR.2015.2421902}, doi = {10.1109/TR.2015.2421902}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/DaD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DaXX16, author = {Gaofeng Da and Maochao Xu and Shouhuai Xu}, title = {A New Approach to Modeling and Analyzing Security of Networked Systems}, journal = {CoRR}, volume = {abs/1603.08305}, year = {2016}, url = {http://arxiv.org/abs/1603.08305}, eprinttype = {arXiv}, eprint = {1603.08305}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DaXX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/XuDX16, author = {Maochao Xu and Gaofeng Da and Shouhuai Xu}, title = {Cyber Epidemic Models with Dependences}, journal = {CoRR}, volume = {abs/1603.08307}, year = {2016}, url = {http://arxiv.org/abs/1603.08307}, eprinttype = {arXiv}, eprint = {1603.08307}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/XuDX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/XuDX15, author = {Maochao Xu and Gaofeng Da and Shouhuai Xu}, title = {Cyber Epidemic Models with Dependences}, journal = {Internet Math.}, volume = {11}, number = {1}, pages = {62--92}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.902407}, doi = {10.1080/15427951.2014.902407}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/XuDX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ma/DaXB14, author = {Gaofeng Da and Maochao Xu and N. Balakrishnan}, title = {On the Lorenz ordering of order statistics from exponential populations and some applications}, journal = {J. Multivar. Anal.}, volume = {127}, pages = {88--97}, year = {2014}, url = {https://doi.org/10.1016/j.jmva.2014.02.005}, doi = {10.1016/J.JMVA.2014.02.005}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ma/DaXB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/DaXX14, author = {Gaofeng Da and Maochao Xu and Shouhuai Xu}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {A new approach to modeling and analyzing security of networked systems}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600184}, doi = {10.1145/2600176.2600184}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/DaXX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ma/DingDZ13, author = {Weiyong Ding and Gaofeng Da and Peng Zhao}, title = {On sample ranges from two sets of heterogenous random variables}, journal = {J. Multivar. Anal.}, volume = {116}, pages = {63--73}, year = {2013}, url = {https://doi.org/10.1016/j.jmva.2012.11.009}, doi = {10.1016/J.JMVA.2012.11.009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ma/DingDZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ma/DaZH12, author = {Gaofeng Da and Ben Zheng and Taizhong Hu}, title = {On computing signatures of coherent systems}, journal = {J. Multivar. Anal.}, volume = {103}, number = {1}, pages = {142--150}, year = {2012}, url = {https://doi.org/10.1016/j.jmva.2011.06.015}, doi = {10.1016/J.JMVA.2011.06.015}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ma/DaZH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ma/LiD10, author = {Xiaohu Li and Gaofeng Da}, title = {Stochastic comparisons in multivariate mixed model of proportional reversed hazard rate with applications}, journal = {J. Multivar. Anal.}, volume = {101}, number = {4}, pages = {1016--1025}, year = {2010}, url = {https://doi.org/10.1016/j.jmva.2009.09.015}, doi = {10.1016/J.JMVA.2009.09.015}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ma/LiD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.