Guanhua Yan
Guanhua Yan
Department of Computer Science, Binghamton University, State University of New York
E-mail confirmado em binghamton.edu - Página inicial
Título
Citado por
Citado por
Ano
Containment of Misinformation Spread in Online Social Networks
NP Nguyen, G Yan, MT Thai, S Eidenbenz
1752012
Virusmeter: Preventing your cellphone from spies
L Liu, G Yan, X Zhang, S Chen
International workshop on recent advances in intrusion detection, 244-264, 2009
1752009
Discriminant malware distance learning on structural information for automated malware classification
D Kong, G Yan
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
1642013
Fine-grained private matching for proximity-based mobile social networking
R Zhang, Y Zhang, J Sun, G Yan
2012 Proceedings IEEE INFOCOM, 1969-1977, 2012
1442012
Malware propagation in online social networks: nature, dynamics, and defense implications
G Yan, G Chen, S Eidenbenz, N Li
Proceedings of the 6th acm symposium on information, computer and …, 2011
1232011
Modeling propagation dynamics of bluetooth worms (extended version)
G Yan, S Eidenbenz
IEEE transactions on mobile computing 8 (3), 353-368, 2008
1122008
Simulation of large scale networks using SSF
G Yan
Proceedings of the 2003 Winter Simulation Conference, 2003. 1, 650-657, 2003
1072003
Bottracer: Execution-based bot-like malware detection
L Liu, S Chen, G Yan, Z Zhang
International Conference on Information Security, 97-113, 2008
942008
Privacy-preserving profile matching for proximity-based mobile social networking
R Zhang, J Zhang, Y Zhang, J Sun, G Yan
IEEE Journal on Selected Areas in Communications 31 (9), 656-668, 2013
912013
Chrome Extensions: Threat Analysis and Countermeasures.
L Liu, X Zhang, G Yan, S Chen
NDSS, 2012
902012
Rinse: The real-time immersive network simulation environment for network security exercises
M Liljenstam, J Liu, D Nicol, Y Yuan, G Yan, C Grier
Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 119-128, 2005
892005
Designing a practical access point association protocol
F Xu, CC Tan, Q Li, G Yan, J Wu
2010 Proceedings IEEE INFOCOM, 1-9, 2010
882010
Bluetooth worm propagation: mobility pattern matters!
G Yan, HD Flores, L Cuellar, N Hengartner, S Eidenbenz, V Vu
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
832007
Exploring discriminatory features for automated malware classification
G Yan, N Brown, D Kong
International Conference on Detection of Intrusions and Malware, and …, 2013
762013
An event buffer flooding attack in DNP3 controlled SCADA systems
D Jin, DM Nicol, G Yan
Proceedings of the 2011 Winter Simulation Conference (WSC), 2614-2626, 2011
712011
Discrete event fluid modeling of background TCP traffic
DM Nicol, G Yan
ACM Transactions on Modeling and Computer Simulation (TOMACS) 14 (3), 211-250, 2004
592004
Detecting selfish exploitation of carrier sensing in 802.11 networks
K Pelechrinis, G Yan, S Eidenbenz, SV Krishnamurthy
IEEE INFOCOM 2009, 657-665, 2009
552009
Analysis of misinformation containment in online social networks
NP Nguyen, G Yan, MT Thai
Computer Networks 57 (10), 2133-2146, 2013
542013
On the effectiveness of structural detection and defense against P2P-based botnets
DT Ha, G Yan, S Eidenbenz, HQ Ngo
2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009
512009
Bluetooth worms: Models, dynamics, and defense implications
G Yan, S Eidenbenz
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 245-256, 2006
482006
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20