ridm@nrct.go.th   ระบบคลังข้อมูลงานวิจัยไทย   รายการโปรดที่คุณเลือกไว้

Xiang, Yang.
หน่วยงาน Central Queensland University, Australia
และรู้จักในชื่อของ
- Xiang, Yang, 1975-
จำนวนงานวิจัยจำแนกรายปี
บุคคลที่เคยร่วมงานวิจัย
ความเชี่ยวชาญ
บุคคลที่เคยร่วมงานวิจัย
ปี
# พ.ศ. จำนวน
1 2553 10
2 2552 4
3 2551 17
4 2550 6
5 2549 1
ผลงานวิจัย
# หัวเรื่อง
ปี พ.ศ. 2553
1 Defending against the propagation of active worms
2 Dynamic and advanced data mining for progressing technological development : innovations and systemic approaches
3 Automatic application signature construction from unknown traffic
4 Modeling the propagation of peer-to-peer worms under quarantine
5 Propagation modeling of peer-to-peer worms
6 Above the trust and security in cloud computing : a notion towards innovation
7 Guest editorial : Security in next generation wireless networks
8 A microscopic competition model and its dynamics analysis on network attacks
9 A fast flowgraph based classification system for packed and polymorphic malware on the endhost
10 Modeling the propagation of peer-to-peer worms
ปี พ.ศ. 2552
11 Flexible deterministic packet marking : an IP traceback system to find the real source of attacks
12 Argus : a light-weighted secure localization scheme for sensor networks
13 Propagation of active worms : a survey
14 Modeling the propagation process of topology-aware worms
ปี พ.ศ. 2551
15 Defending against the propagation of active worms
16 A Multi-core supported intrusion detection system
17 Multi-core defense system (MSDS) for protecting computer infrastructure against DDoS attacks
18 Detecting and tracing DDoS attacks by Intelligent Decision Prototype
19 Protecting information systems from DDoS attack using multicore methodology
20 Protecting web services with service oriented traceback architecture
21 Shortening the slow start phase in the propagation of active worms
22 Accelerating the propagation of active worms by employing multiple target discovery techniques
23 Network attacks and defense systems
24 A cross-authentication model and implementation
25 Checkpointing schemes for grid workflow systems
26 Using multi-core processors to support network security applications
27 Ubiquitous multicore (UM) methodology for multimedia
28 Multi-core security defense system (MSDS)
29 Protecting web services from DDoS attacks by SOTA
30 Managing email overload with an automatic nonparametric clustering system
31 Using multi-core to support security-related applications
ปี พ.ศ. 2550
32 Defending against Distributed Denial of Service
33 Pervasive computing at tableside : a wireless web-based ordering system
34 Simulation and analysis of DDos in active defense environment
35 On the effectiveness of flexible deterministic packet marking for DDoS defense
36 Spam classification using adaptive boosting algorithm
37 Managing email overload with an automatic nonparametric clustering approach
ปี พ.ศ. 2549
38 Protecting information infrastructure from DDoS attacks by MADF