Debao Xiao

According to our database1, Debao Xiao authored at least 20 papers between 2006 and 2011.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Intrusion diagnosis and prediction with expert system.
Secur. Commun. Networks, 2011

2009
Visualization-Based Study on Information Specification Languages for Network Management Using Formal Concept Analysis.
Proceedings of the Systems and Virtualization Management. Standards and the Cloud, 2009

A Scalable, Vulnerability Modeling and Correlating Method for Network Security.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009

Application of Security Ontology to Context-Aware Alert Analysis.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Towards a Collaborative and Systematic Approach to Alert Verification.
J. Softw., 2008

An Alert Correlation Method Based on Improved Cluster Algorithm.
Proceedings of the PACIIA 2008, 2008

Evaluation on data modeling languages for NETCONF-based network management.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and Implementation.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Applying Data Fusion in Collaborative Alerts Correlation.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

An adaptive architecture of applying vulnerability analysis to IDS alerts.
Proceedings of the 2008 International Conference on Advanced Infocomm Technology, 2008

On Network Management Solutions and the Potential of P2P Technologies.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Design and Implementation of NETCONF-Based Network Management System.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Considerations on NETCONF-Based Data Modeling.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2007
Alert Verification Based on Attack Classification in Collaborative Intrusion Detection.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Policy-Based Energy Efficient Clustering Scheme for Wireless Sensor Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Network Security Data Management Using Web Services-based SOA.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Understanding Peer Behavior and Designing Incentive Mechanism in Peer-to-Peer Networks: An Analytical Model Based on Game Theory.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

2006
A Common Ontology-Based Intelligent Configuration Management Model for IP Network Devices.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Towards Web Services-based Collaborative Design.
Proceedings of the 10th International Conference on CSCW in Design, 2006

An Integration of Ontology-based and Policy-based Network Management for Automation.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006


  Loading...