Wanyu Zang
According to our database1,
Wanyu Zang
authored at least 40 papers
between 2002 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
IEEE Trans. Dependable Secur. Comput., 2021
2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
2019
EAI Endorsed Trans. Security Safety, 2019
2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
2016
Energy efficient approximate self-adaptive data collection in wireless sensor networks.
Frontiers Comput. Sci., 2016
2015
J. Internet Serv. Inf. Secur., 2015
EURASIP J. Wirel. Commun. Netw., 2015
AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system.
Proceedings of the International Conference on Computing, Networking and Communications, 2015
2014
Secur. Commun. Networks, 2014
Int. J. Inf. Sec., 2014
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014
Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Quantitative survivability evaluation of three virtual machine-based server architectures.
J. Netw. Comput. Appl., 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Improving Cloud Survivability through Dependency based Virtual Machine Placement.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Information Security and Privacy Research, 2012
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of IEEE International Conference on Communications, 2011
2010
A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++.
Proceedings of the 2010 Spring Simulation Multiconference, 2010
Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures.
Proceedings of the SECRYPT 2010, 2010
2009
J. Netw. Comput. Appl., 2009
Proceedings of the NBiS 2009, 2009
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the Information Systems Security, Second International Conference, 2006
2005
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Trans. Inf. Syst. Secur., 2005
J. Comput. Secur., 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004
2003
Intrusion Masking for Distributed Atomic Operations.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
JAPS-II: A Source to Source Parallelizing Compiler for Java.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002