BibTeX records: Wei Wang 0084

download as .bib file

@inproceedings{DBLP:conf/cscn/ForteWVF16,
  author       = {Andrea G. Forte and
                  Wei Wang and
                  Luca Veltri and
                  Gianluigi Ferrari},
  title        = {A {P2P} virtual core-network architecture for next-generation mobility
                  networks},
  booktitle    = {2016 {IEEE} Conference on Standards for Communications and Networking,
                  {CSCN} 2016, Berlin, Germany, October 31 - November 2, 2016},
  pages        = {67--73},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSCN.2016.7785154},
  doi          = {10.1109/CSCN.2016.7785154},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscn/ForteWVF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/WangB16,
  author       = {Wei Wang and
                  Jeffrey Bickford},
  title        = {WhatApp: Modeling mobile applications by domain names},
  booktitle    = {12th {IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2016, New York, NY, USA, October
                  17-19, 2016},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/WiMOB.2016.7763253},
  doi          = {10.1109/WIMOB.2016.7763253},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wimob/WangB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmu/ForteW15,
  author       = {Andrea G. Forte and
                  Wei Wang},
  title        = {Towards activity-based app search},
  booktitle    = {Eighth International Conference on Mobile Computing and Ubiquitous
                  Networking, {ICMU} 2015, Hakodate, Japan, January 20-22, 2015},
  pages        = {42--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICMU.2015.7061026},
  doi          = {10.1109/ICMU.2015.7061026},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmu/ForteW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WangIB15,
  author       = {Wei Wang and
                  Mikhail Istomin and
                  Jeffrey Bickford},
  editor       = {Meikang Qiu and
                  Shouhuai Xu and
                  Moti Yung and
                  Haibo Zhang},
  title        = {Dandelion - Revealing Malicious Groups of Interest in Large Mobile
                  Networks},
  booktitle    = {Network and System Security - 9th International Conference, {NSS}
                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9408},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25645-0\_1},
  doi          = {10.1007/978-3-319-25645-0\_1},
  timestamp    = {Thu, 23 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WangIB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/WangBMSS13,
  author       = {Wei Wang and
                  Jeffrey Bickford and
                  Ilona Murynets and
                  Ramesh Subbaraman and
                  Gokul Singaraju},
  title        = {Detecting Targeted Attacks By Multilayer Deception},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {2},
  pages        = {175--199},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.224},
  doi          = {10.13052/JCSM2245-1439.224},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/WangBMSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangMBWX13,
  author       = {Wei Wang and
                  Ilona Murynets and
                  Jeffrey Bickford and
                  Christopher Van Wart and
                  Gang Xu},
  title        = {What you see predicts what you get - lightweight agent-based malware
                  detection},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {33--48},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.528},
  doi          = {10.1002/SEC.528},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangMBWX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BoggsWMCP13,
  author       = {Nathaniel Boggs and
                  Wei Wang and
                  Suhas Mathur and
                  Baris Coskun and
                  Carol Pincock},
  editor       = {Charles N. Payne Jr.},
  title        = {Discovery of emergent malicious campaigns in cellular networks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {29--38},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523657},
  doi          = {10.1145/2523649.2523657},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BoggsWMCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/HeWXZM12,
  author       = {Fangming He and
                  Wei Wang and
                  Xingzhong Xu and
                  Lei Zhou and
                  Hong Man},
  title        = {A network coding method for channel signatures based key distribution},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {5036--5041},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6364090},
  doi          = {10.1109/ICC.2012.6364090},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/HeWXZM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sarnoff/WangBMSFS12,
  author       = {Wei Wang and
                  Jeffrey Bickford and
                  Ilona Murynets and
                  Ramesh Subbaraman and
                  Andrea G. Forte and
                  Gokul Singaraju},
  title        = {Catching the Wily Hacker: {A} multilayer deception system},
  booktitle    = {35th {IEEE} Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SARNOF.2012.6222760},
  doi          = {10.1109/SARNOF.2012.6222760},
  timestamp    = {Thu, 23 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sarnoff/WangBMSFS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/HeMW11,
  author       = {Fangming He and
                  Hong Man and
                  Wei Wang},
  title        = {Maximal Ratio Diversity Combining Enhanced Security},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {15},
  number       = {5},
  pages        = {509--511},
  year         = {2011},
  url          = {https://doi.org/10.1109/LCOMM.2011.030911.102343},
  doi          = {10.1109/LCOMM.2011.030911.102343},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/HeMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vnc/HeMW10,
  author       = {Fangming He and
                  Hong Man and
                  Wei Wang},
  title        = {Physical layer assisted security for mobile {OFDM} networks},
  booktitle    = {Proceedings of the Second {IEEE} Vehicular Networking Conference,
                  {VVNC} 2010, Jersey City, New Jersey, USA, December 13-15, 2010},
  pages        = {346--353},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/VNC.2010.5698262},
  doi          = {10.1109/VNC.2010.5698262},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/vnc/HeMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangML09,
  author       = {Wei Wang and
                  Hong Man and
                  Yu Liu},
  title        = {A framework for intrusion detection systems by social network analysis
                  methods in \emph{ad hoc} networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2},
  number       = {6},
  pages        = {669--685},
  year         = {2009},
  url          = {https://doi.org/10.1002/sec.108},
  doi          = {10.1002/SEC.108},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangML09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/WangML10,
  author       = {Wei Wang and
                  Hong Man and
                  Yu Liu},
  title        = {An Intrusion Detection System in Ad Hoc Networks: {A} Social Network
                  Analysis Approach},
  booktitle    = {6th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2009, Las Vegas, NV, USA, 10-13 Jan., 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CCNC.2009.4784728},
  doi          = {10.1109/CCNC.2009.4784728},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/WangML10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/0084M09,
  author       = {Wei Wang and
                  Hong Man},
  editor       = {Belur V. Dasarathy},
  title        = {Exploring social relations for the intrusion detection in ad hoc networks},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {734402},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.818142},
  doi          = {10.1117/12.818142},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/0084M09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WangMH09,
  author       = {Wei Wang and
                  Hong Man and
                  Fangming He},
  title        = {Collaborative Anomaly Detection for Structured {P2P} Networks},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5425503},
  doi          = {10.1109/GLOCOM.2009.5425503},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WangMH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics