Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Wei Wang 0084
@inproceedings{DBLP:conf/cscn/ForteWVF16, author = {Andrea G. Forte and Wei Wang and Luca Veltri and Gianluigi Ferrari}, title = {A {P2P} virtual core-network architecture for next-generation mobility networks}, booktitle = {2016 {IEEE} Conference on Standards for Communications and Networking, {CSCN} 2016, Berlin, Germany, October 31 - November 2, 2016}, pages = {67--73}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CSCN.2016.7785154}, doi = {10.1109/CSCN.2016.7785154}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscn/ForteWVF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/WangB16, author = {Wei Wang and Jeffrey Bickford}, title = {WhatApp: Modeling mobile applications by domain names}, booktitle = {12th {IEEE} International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2016, New York, NY, USA, October 17-19, 2016}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/WiMOB.2016.7763253}, doi = {10.1109/WIMOB.2016.7763253}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wimob/WangB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmu/ForteW15, author = {Andrea G. Forte and Wei Wang}, title = {Towards activity-based app search}, booktitle = {Eighth International Conference on Mobile Computing and Ubiquitous Networking, {ICMU} 2015, Hakodate, Japan, January 20-22, 2015}, pages = {42--47}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICMU.2015.7061026}, doi = {10.1109/ICMU.2015.7061026}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmu/ForteW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WangIB15, author = {Wei Wang and Mikhail Istomin and Jeffrey Bickford}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {3--17}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_1}, doi = {10.1007/978-3-319-25645-0\_1}, timestamp = {Thu, 23 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WangIB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/WangBMSS13, author = {Wei Wang and Jeffrey Bickford and Ilona Murynets and Ramesh Subbaraman and Gokul Singaraju}, title = {Detecting Targeted Attacks By Multilayer Deception}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {2}, pages = {175--199}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.224}, doi = {10.13052/JCSM2245-1439.224}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/WangBMSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangMBWX13, author = {Wei Wang and Ilona Murynets and Jeffrey Bickford and Christopher Van Wart and Gang Xu}, title = {What you see predicts what you get - lightweight agent-based malware detection}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {33--48}, year = {2013}, url = {https://doi.org/10.1002/sec.528}, doi = {10.1002/SEC.528}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangMBWX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BoggsWMCP13, author = {Nathaniel Boggs and Wei Wang and Suhas Mathur and Baris Coskun and Carol Pincock}, editor = {Charles N. Payne Jr.}, title = {Discovery of emergent malicious campaigns in cellular networks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {29--38}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523657}, doi = {10.1145/2523649.2523657}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BoggsWMCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/HeWXZM12, author = {Fangming He and Wei Wang and Xingzhong Xu and Lei Zhou and Hong Man}, title = {A network coding method for channel signatures based key distribution}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {5036--5041}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6364090}, doi = {10.1109/ICC.2012.6364090}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/HeWXZM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sarnoff/WangBMSFS12, author = {Wei Wang and Jeffrey Bickford and Ilona Murynets and Ramesh Subbaraman and Andrea G. Forte and Gokul Singaraju}, title = {Catching the Wily Hacker: {A} multilayer deception system}, booktitle = {35th {IEEE} Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SARNOF.2012.6222760}, doi = {10.1109/SARNOF.2012.6222760}, timestamp = {Thu, 23 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sarnoff/WangBMSFS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/HeMW11, author = {Fangming He and Hong Man and Wei Wang}, title = {Maximal Ratio Diversity Combining Enhanced Security}, journal = {{IEEE} Commun. Lett.}, volume = {15}, number = {5}, pages = {509--511}, year = {2011}, url = {https://doi.org/10.1109/LCOMM.2011.030911.102343}, doi = {10.1109/LCOMM.2011.030911.102343}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/HeMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/HeMW10, author = {Fangming He and Hong Man and Wei Wang}, title = {Physical layer assisted security for mobile {OFDM} networks}, booktitle = {Proceedings of the Second {IEEE} Vehicular Networking Conference, {VVNC} 2010, Jersey City, New Jersey, USA, December 13-15, 2010}, pages = {346--353}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/VNC.2010.5698262}, doi = {10.1109/VNC.2010.5698262}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/vnc/HeMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangML09, author = {Wei Wang and Hong Man and Yu Liu}, title = {A framework for intrusion detection systems by social network analysis methods in \emph{ad hoc} networks}, journal = {Secur. Commun. Networks}, volume = {2}, number = {6}, pages = {669--685}, year = {2009}, url = {https://doi.org/10.1002/sec.108}, doi = {10.1002/SEC.108}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangML09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/WangML10, author = {Wei Wang and Hong Man and Yu Liu}, title = {An Intrusion Detection System in Ad Hoc Networks: {A} Social Network Analysis Approach}, booktitle = {6th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2009, Las Vegas, NV, USA, 10-13 Jan., 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CCNC.2009.4784728}, doi = {10.1109/CCNC.2009.4784728}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/WangML10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/0084M09, author = {Wei Wang and Hong Man}, editor = {Belur V. Dasarathy}, title = {Exploring social relations for the intrusion detection in ad hoc networks}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {734402}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.818142}, doi = {10.1117/12.818142}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/0084M09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WangMH09, author = {Wei Wang and Hong Man and Fangming He}, title = {Collaborative Anomaly Detection for Structured {P2P} Networks}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5425503}, doi = {10.1109/GLOCOM.2009.5425503}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WangMH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.