Остановите войну!
for scientists:
default search action
Wu Liu
Publications
- 2018
- [c60]Jian Jiang, Jia Zhang, Hai-Xin Duan, Kang Li, Wu Liu:
Analysis and Measurement of Zone Dependency in the Domain Name System. ICC 2018: 1-7 - 2017
- [c53]Jia Zhang, Hai-Xin Duan, Wu Liu, Xingkun Yao:
How to Notify a Vulnerability to the Right Person? Case Study: In an ISP Scope. GLOBECOM 2017: 1-7 - 2011
- [j6]Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
Anonymity analysis of P2P anonymous communication systems. Comput. Commun. 34(3): 358-366 (2011) - [c22]Wu Liu, Ping Ren, Ke Liu, Hai-Xin Duan:
User cooperation trust model and its application in network security management. FSKD 2011: 2335-2339 - [c21]Wu Liu, Hai-Xin Duan, Ping Ren:
Cooperation-Based Trust Model and Its Application in Network Security Management. ICA3PP (1) 2011: 453-459 - 2010
- [c20]Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
Analysis of Anonymity in P2P Anonymous Communication Systems. AINA Workshops 2010: 860-865 - [c19]Wu Liu, Hai-Xin Duan, Ping Ren, Jianping Wu:
IABA: An improved PNN Algorithm for anomaly detection in network security management. ICNC 2010: 335-339 - 2009
- [j4]Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
WindTalker: A P2P-Based Low-Latency Anonymous Communication Network. IEICE Trans. Commun. 92-B(10): 3183-3194 (2009) - 2008
- [j3]Hong Zhang, Hai-Xin Duan, Wu Liu:
RRM: An incentive reputation model for promoting good behaviors in distributed systems. Sci. China Ser. F Inf. Sci. 51(11): 1871-1882 (2008) - [c15]Wu Liu, Hai-Xin Duan, Tao Lin, Xing Li, Jian-Ping Wu:
Attacking Test and Online Forensics in IPv6 Networks. IMF 2008: 87-106 - 2005
- [c10]Hong Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
An Extensible AAA Infrastructure for IPv6. CIS (2) 2005: 482-487 - [c9]Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems. CIS (2) 2005: 518-525 - [c8]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
New Algorithm Mining Intrusion Patterns. FSKD (2) 2005: 774-777 - [c7]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
New Method for Intrusion Features Mining in IDS. ICIC (1) 2005: 429-437 - [c6]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
The Authorization Service in Dynamic Trust Domains. ICITA (2) 2005: 564-567 - [c5]Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:
Improved Marking Model ERPPM Tracing Back to DDoS Attacker. ICITA (2) 2005: 759-762 - 2004
- [c4]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping Ren:
XML Based X.509 Authorization in CERNET Grid. GCC 2004: 325-332 - [c3]Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li, Ping Ren:
Algorithms for Congestion Detection and Control. GCC Workshops 2004: 374-381 - [c2]Wu Liu, Hai-Xin Duan, Yong Feng, Yong-Bin Li, Ping Ren:
Improved algorithms tracing back to attacking sources. Parallel and Distributed Computing and Networks 2004: 222-226 - 2003
- [c1]Wu Liu, Hai-Xin Duan, Jianping Wu, Ping Ren, Li-Hua Lu:
Distributed IDS Tracing Back to Attacking Sources. GCC (1) 2003: 859-866
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint