Donghai Tian
Orcid: 0000-0003-2217-4514
According to our database1,
Donghai Tian
authored at least 40 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Syst. Softw., February, 2024
J. Supercomput., January, 2024
MDGraph: A novel malware detection method based on memory dump and graph neural network.
Expert Syst. Appl., 2024
Component-based modeling of cascading failure propagation in directed dual-weight software networks.
Comput. Networks, 2024
Proceedings of the 2024 5th International Conference on Computing, 2024
2023
J. Inf. Secur. Appl., June, 2023
2022
IEEE Trans. Cloud Comput., 2022
J. Inf. Secur. Appl., 2022
CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning.
J. Grid Comput., 2022
Trans. Emerg. Telecommun. Technol., 2022
2021
Expert Syst. Appl., 2021
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning.
Comput. Networks, 2021
2020
Comput. Networks, 2020
VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020
2019
Future Gener. Comput. Syst., 2019
IEEE Access, 2019
2018
Softw. Pract. Exp., 2018
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
2017
J. Inf. Sci. Eng., 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
A Secure and Efficient Kernel Log Transfer Mechanism for Virtualization Environments.
J. Inf. Sci. Eng., 2016
2015
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015
2014
IEICE Trans. Inf. Syst., 2014
IEICE Trans. Inf. Syst., 2014
Proceedings of the Secure Cloud Computing, 2014
2013
Secur. Commun. Networks, 2013
2012
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the Information Security Practice and Experience, 2011
2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks.
Proceedings of the Information Security - 13th International Conference, 2010
2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009