Design and implementation of trusted routing strategy based on IPv6 flow identification.
Proceedings of the 10th International Conference on Communications and Networking in China, 2015
Cognitive Networks Autonomic Decision-making Approach Based on Influence Diagram.
J. Networks, 2012
Realtime Encrypted Traffic Identification using Machine Learning.
J. Softw., 2011
Pricing Incentive Mechanism based on Multi-stages Traffic Classification Methodology for QoS-enabled Networks.
J. Networks, 2011
Self-Adaptive QoS Control Mechanism in Cognitive Networks Based on Intelligent Service Awareness.
Proceedings of the Web Information Systems and Mining - International Conference, 2011
Online Internet Intrusion Detection Based on Flow Statistical Characteristics.
Proceedings of the Knowledge Science, Engineering and Management, 2011
Composite lightweight traffic classification system for network management.
Int. J. Netw. Manag., 2010
A Novel Trust Management Model for P2P Network with Reputation and Risk Evaluation.
Proceedings of the International Conference on E-Business and E-Government, 2010
Method to Improve the Performance of Common Channel Framework.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
Non-invasive valve stiction detection using wavelet technology.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009
A Group Trust Mechanism Based on User Behaviors and Policy Trust in Trustworthy Routing Systems.
Proceedings of the PACIIA 2008, 2008
Real-Time P2P Traffic Identification.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Active Queue Management Based on Single Neural Adaptive PID Algorithm.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
A Novel Network Management Architecture for Self-organizing Network.
Proceedings of the International Conference on Networking, 2007
P2P Traffic Identification Technique.
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Modeling and Analyzing Peer-to-Peer File-Sharing System.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006
An Approach to Network Misuse Detection Based on Extension Matrix and Genetic Algorithm.
Proceedings of the Firth IEEE International Conference on Cognitive Informatics, 2006