Zesheng Chen
Zesheng Chen
Purdue University Fort Wayne
Adresse e-mail validée de pfw.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Modeling the spread of active worms
Z Chen, L Gao, K Kwiat
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
7452003
Spatial-temporal modeling of malware propagation in networks
Z Chen, C Ji
IEEE Transactions on Neural Networks 16 (5), 1291-1303, 2005
1492005
Modeling primary user emulation attacks and defenses in cognitive radio networks
Z Chen, T Cooklev, C Chen, C Pomalaza-Ráez
2009 IEEE 28th International Performance Computing and Communications …, 2009
1282009
A self-learning worm using importance scanning
Z Chen, C Ji
Proceedings of the 2005 ACM workshop on Rapid malcode, 22-29, 2005
702005
Optimal worm-scanning method using vulnerable-host distributions
Z Chen, C Ji
International Journal of Security and Networks 2 (1-2), 71-80, 2007
652007
An information-theoretic view of network-aware malware attacks
Z Chen, C Ji
IEEE Transactions on Information Forensics and Security 4 (3), 530-541, 2009
612009
Spatial-temporal characteristics of internet malicious sources
Z Chen, C Ji, P Barford
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 2306-2314, 2008
612008
Measuring network-aware worm spreading ability
Z Chen, C Ji
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
472007
Comments on" Modeling TCP reno performance: a simple model and its empirical Validation"
Z Chen, T Bu, M Ammar, D Towsley
IEEE/ACM Transactions on Networking 14 (2), 451-453, 2006
402006
Importance-scanning worm using vulnerable-host distribution.
Z Chen, C Ji
GLOBECOM, 6, 2005
402005
Understanding localized-scanning worms
Z Chen, C Chen, C Ji
2007 IEEE International Performance, Computing, and Communications …, 2007
372007
Exploiting contact spatial dependency for opportunistic message forwarding
C Chen, Z Chen
IEEE transactions on Mobile Computing 8 (10), 1397-1411, 2009
192009
Modeling and defending against internet worm attacks
Z Chen
Georgia Institute of Technology, 2007
192007
Understanding divide-conquer-scanning worms
Y Li, Z Chen, C Chen
2008 IEEE International Performance, Computing and Communications Conference …, 2008
182008
Darknet-based inference of internet worm temporal characteristics
Q Wang, Z Chen, C Chen
IEEE Transactions on Information Forensics and Security 6 (4), 1382-1393, 2011
152011
On the robustness of the botnet topology formed by worm infection
Q Wang, Z Chen, C Chen, N Pissinou
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
152010
Enhancing intrusion detection system with proximity information
Z Zhuang, Y Li, Z Chen
International Journal of Security and Networks 5 (4), 207-219, 2010
152010
Evaluating contacts for routing in highly partitioned mobile networks
C Chen, Z Chen
Proceedings of the 1st international MobiSys workshop on Mobile …, 2007
152007
Towards a routing framework in ad hoc space networks
C Chen, Z Chen
International Journal of Ad Hoc and Ubiquitous Computing 5 (1), 44-55, 2009
142009
Characterizing and defending against divide-conquer-scanning worms
C Chen, Z Chen, Y Li
Computer Networks 54 (18), 3210-3222, 2010
132010
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20