Recent Publication:

2010

  1. Wu Liu Hai-xin Duan Ping Ren Jian-ping Wu. Weakness analysis and attack test for WLAN, 2010 International Conference on Green Circuits and Systems (ICGCS),21-23 June, 2010: 387 – 391 (EI)
  2. LIU Wu, DUAN Hai-xin, REN Ping, Jian-ping Wu. SSL-DP: A Rootkit of Network Based SSL and TLS Traffic Decryptor, 2010 Second Cybercrime and Trustworthy Computing Workshop, 19-21, July 2010, Ballarat, Austrilia, CTC.2010:29-33(EI)
  3. Wu Liu, Hai-Xin Duan, Ping Ren, Jianping Wu: IABA: An improved PNN Algorithm for anomaly detection in network security management. ICNC 2010: 335-339(EI)
  4. Jia Zhang Haixin Duan Wu Liu Jianping Wu. A light-weighted extension of anonymous communications in IPv6 Network, 2010 International Conference on Green Circuits and Systems (ICGCS),21-23 June, 2010: 404 – 408(EI)
  5. Xuefeng Li Haixin Duan Wu Liu Jianping Wu. The growing model of Botnets, 2010 International Conference on Green Circuits and Systems (ICGCS),21-23 June, 2010: 414 – 419(EI)
  6. Donghong Sun ; Xuefeng Li ; Wu Liu ; Jianping Wu . The New Architecture of P2P-Botnet, 2010 Second Cybercrime and Trustworthy Computing Workshop, 19-21, July 2010, Ballarat, Austrilia, CTC.2010:34-40(EI)
  7. Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu: Analysis of Anonymity in P2P Anonymous Communication Systems. 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops(AINA 2010): 860-865 (EI)
  8. Jia Zhang, Haixin Duan, Wu Liu, Jianping Wu. Anonymity analysis of P2P anonymous communication systems. J. of Computer Communications, 2010 Published by Elsevier. 7 July 2010
  9. Lei Hou, Haixin Duan, Jianping Wu, et al. Distinguishing the Master to Defend DDoS Attack in Peer-to-Peer Networks. Proceedings of the third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP)(in conjunction with The 10th IEEE International Conference on Computer and Information Technology (CIT 2010)),2010,p -. (EI 收录, 检索号: 20104613393430.)
  10. Z. Chen, G. Gu, J. Zhuge, J. Nazario, X. Han, WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios, to appear in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS’11) , March 2011.

2009

  1. Jia ZHANG, Haixin DUAN, Wu LIU, Jianping WU. WindTalker: A P2P-Based Low-Latency Anonymous Communication Network, IEICE Transactions on Communications, 2009, VOL. E92-B, NO.10, pp.3183-3194
  2. LIU Wu, DUAN Hai-xin, LIN Tao, LI Xing, WU Jian-ping. H6Proxy: ICMPv6 Weakness Analysis and Implementation of IPv6 Attacking Test Proxy. Cybercrime and Trustworthy Computing (CTC-2009), July 7-10, 2009,   Brisbane, Australia

2008

  1. Zhang Jia, Duan Haixin, Wang Lanjia. A Fast Method of Signature Generation for Polymorphic Worms, proceedings of the 2008 International Conference on Computer and Electrical Engineering, ICCEE 2008, pp8-13
  2. [4] Jia Zhang, Yuntao Guan, Xiaoxin Jiang, Haixin Duan, Jianping Wu. AMCAS: An Automatic Malicious Code Analysis System. In Proceedings of the Ninth International Conference on Web-Age Information Management (WAIM’08),  Zhangjiajie, China, Jul, 2008.

Comments are closed.