Signature tree generation for polymorphic worms Y Tang, B Xiao, X Lu Computers, IEEE Transactions on 60 (4), 565-579, 2011 | 64 | 2011 |
Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms Y Tang, B Xiao, X Lu computers & security 28 (8), 827-842, 2009 | 51 | 2009 |
Gregex: GPU Based High Speed Regular Expression Matching Engine L Wang, S Chen, Y Tang, J Su Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2011 …, 2011 | 42 | 2011 |
Concept, characteristics and defending mechanism of worms T Yong, L Jiaqing, X Bin, WEI Guiyi IEICE TRANSACTIONS on Information and Systems 92 (5), 799-809, 2009 | 33 | 2009 |
Generating simplified regular expression signatures for polymorphic worms Y Tang, X Lu, B Xiao Autonomic and Trusted Computing, 478-488, 2007 | 21 | 2007 |
Automatic Generation of Attack Signatures Based on Multi-Sequence Alignment [J] TYLUXC HU, HPZHU Pei-Dong Chinese Journal of Computers 9, 003, 2006 | 19* | 2006 |
HonIDS: enhancing honeypot system with intrusion detection models Y Tang, HP Hu, XC Lu, J Wang Information Assurance, 2006. IWIA 2006. Fourth IEEE International Workshop …, 2006 | 15 | 2006 |
Survey of automatic attack signature generation [J] Y TANG, X LU, Y WANG Journal on Communications 2, 020, 2009 | 5 | 2009 |
Generating malware signature using transcoding from sequential data to amino acid sequence Y Zhao, Y Tang, Y Wang, S Chen High Performance Computing and Simulation (HPCS), 2013 International …, 2013 | 3 | 2013 |
A Malware Homologous Analysis Method Based on Sequence of System Function Q Guan, Y Tang, X Liu | 2* | |
KNN–Q (λ) algorithm-based line-grasping control of a de-icing robot S Wei, Y Wang, Y Tang Proceedings of the Institution of Mechanical Engineers, Part I: Journal of …, 2012 | 1 | 2012 |
A Stream Reassembly mechanism based on DPI S Chen, Y Tang Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW …, 2012 | 1 | 2012 |
Structural Vulnerability Analysis for Large-Scale Distributed System based on Multi-layer Topology Model X Kuang, G Zhao, Y Tang, J Li PRZEGLAD ELEKTROTECHNICZNY 88 (3 B), 78-83, 2012 | | 2012 |
Automatic generation of attack signatures based on multi-sequence alignment. Y Tang, XC Lu, HP Hu, PD Zhu Jisuanji Xuebao(Chinese Journal of Computers) 29 (9), 1533-1541, 2006 | | 2006 |