Follow
Yong Tang
Yong Tang
国防科技大学计算机学院副教授
Verified email at nudt.edu.cn
Title
Cited by
Cited by
Year
Signature tree generation for polymorphic worms
Y Tang, B Xiao, X Lu
Computers, IEEE Transactions on 60 (4), 565-579, 2011
642011
Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms
Y Tang, B Xiao, X Lu
computers & security 28 (8), 827-842, 2009
512009
Gregex: GPU Based High Speed Regular Expression Matching Engine
L Wang, S Chen, Y Tang, J Su
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2011 …, 2011
422011
Concept, characteristics and defending mechanism of worms
T Yong, L Jiaqing, X Bin, WEI Guiyi
IEICE TRANSACTIONS on Information and Systems 92 (5), 799-809, 2009
332009
Generating simplified regular expression signatures for polymorphic worms
Y Tang, X Lu, B Xiao
Autonomic and Trusted Computing, 478-488, 2007
212007
Automatic Generation of Attack Signatures Based on Multi-Sequence Alignment [J]
TYLUXC HU, HPZHU Pei-Dong
Chinese Journal of Computers 9, 003, 2006
19*2006
HonIDS: enhancing honeypot system with intrusion detection models
Y Tang, HP Hu, XC Lu, J Wang
Information Assurance, 2006. IWIA 2006. Fourth IEEE International Workshop …, 2006
152006
Survey of automatic attack signature generation [J]
Y TANG, X LU, Y WANG
Journal on Communications 2, 020, 2009
52009
Generating malware signature using transcoding from sequential data to amino acid sequence
Y Zhao, Y Tang, Y Wang, S Chen
High Performance Computing and Simulation (HPCS), 2013 International …, 2013
32013
A Malware Homologous Analysis Method Based on Sequence of System Function
Q Guan, Y Tang, X Liu
2*
KNN–Q (λ) algorithm-based line-grasping control of a de-icing robot
S Wei, Y Wang, Y Tang
Proceedings of the Institution of Mechanical Engineers, Part I: Journal of …, 2012
12012
A Stream Reassembly mechanism based on DPI
S Chen, Y Tang
Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW …, 2012
12012
Structural Vulnerability Analysis for Large-Scale Distributed System based on Multi-layer Topology Model
X Kuang, G Zhao, Y Tang, J Li
PRZEGLAD ELEKTROTECHNICZNY 88 (3 B), 78-83, 2012
2012
Automatic generation of attack signatures based on multi-sequence alignment.
Y Tang, XC Lu, HP Hu, PD Zhu
Jisuanji Xuebao(Chinese Journal of Computers) 29 (9), 1533-1541, 2006
2006
The system can't perform the operation now. Try again later.
Articles 1–14