Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

BibTeX records: Xinguang Tian

download as .bib file

@article{DBLP:journals/comcom/LiuDLT20,
  author       = {Jia Liu and
                  Miyi Duan and
                  Wenfa Li and
                  Xinguang Tian},
  title        = {HMMs based masquerade detection for network security on with parallel
                  computing},
  journal      = {Comput. Commun.},
  volume       = {156},
  pages        = {168--173},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.03.048},
  doi          = {10.1016/J.COMCOM.2020.03.048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/LiuDLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/XiaoTZX13,
  author       = {Xi Xiao and
                  Xinguang Tian and
                  Qibin Zhai and
                  Shutao Xia},
  title        = {Corrigendum to "A variable-length model for masquerade detection"
                  {[J.} Syst. Softw. 85(2012) 2470-2478]},
  journal      = {J. Syst. Softw.},
  volume       = {86},
  number       = {3},
  pages        = {868},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jss.2012.11.008},
  doi          = {10.1016/J.JSS.2012.11.008},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/XiaoTZX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/XiaoTZX12,
  author       = {Xi Xiao and
                  Xinguang Tian and
                  Qibin Zhai and
                  Shutao Xia},
  title        = {A variable-length model for masquerade detection},
  journal      = {J. Syst. Softw.},
  volume       = {85},
  number       = {11},
  pages        = {2470--2478},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jss.2012.05.049},
  doi          = {10.1016/J.JSS.2012.05.049},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/XiaoTZX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/TianCDLCC10,
  author       = {Xinguang Tian and
                  Xueqi Cheng and
                  Miyi Duan and
                  Rui Liao and
                  Hong Chen and
                  Xiaojuan Chen},
  title        = {Network intrusion detection based on system calls and data mining},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {4},
  number       = {4},
  pages        = {522--528},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11704-010-0570-9},
  doi          = {10.1007/S11704-010-0570-9},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/TianCDLCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mj/TianZZ10,
  author       = {Xinguang Tian and
                  Zhilong Zhang and
                  Eryang Zhang},
  title        = {Spurious signals due to amplitude quantization in direct digital frequency
                  synthesizers},
  journal      = {Microelectron. J.},
  volume       = {41},
  number       = {2-3},
  pages        = {114--120},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.mejo.2010.01.002},
  doi          = {10.1016/J.MEJO.2010.01.002},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mj/TianZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}