Остановите войну!
for scientists:
default search action
Guanhua Yan
- > Home > Persons > Guanhua Yan
Publications
- 2014
- [c44]Guanhua Yan, Stephan J. Eidenbenz:
Sim-Watchdog: Leveraging Temporal Similarity for Anomaly Detection in Dynamic Graphs. ICDCS 2014: 154-165 - 2013
- [j10]Md. Sazzadur Rahman, Guanhua Yan, Harsha V. Madhyastha, Michalis Faloutsos, Stephan J. Eidenbenz, Mike Fisk:
iDispatcher: A unified platform for secure planet-scale information dissemination. Peer-to-Peer Netw. Appl. 6(1): 46-60 (2013) - 2012
- [j8]Konstantinos Pelechrinis, Guanhua Yan, Stephan J. Eidenbenz, Srikanth V. Krishnamurthy:
Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks. IEEE Trans. Mob. Comput. 11(7): 1086-1101 (2012) - [c33]Nam P. Nguyen, Guanhua Yan, My T. Thai, Stephan J. Eidenbenz:
Containment of misinformation spread in online social networks. WebSci 2012: 213-222 - 2011
- [j7]Guanhua Yan, Duc T. Ha, Stephan J. Eidenbenz:
AntBot: Anti-pollution peer-to-peer botnets. Comput. Networks 55(8): 1941-1956 (2011) - [c32]Guanhua Yan, Guanling Chen, Stephan J. Eidenbenz, Nan Li:
Malware propagation in online social networks: nature, dynamics, and defense implications. AsiaCCS 2011: 196-206 - [c30]Shiva Prasad Kasiviswanathan, Stephan J. Eidenbenz, Guanhua Yan:
Geography-based analysis of the Internet infrastructure. INFOCOM 2011: 131-135 - [c29]Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz:
RatBot: Anti-enumeration Peer-to-Peer Botnets. ISC 2011: 135-151 - [c28]Yuanyuan Zeng, Guanhua Yan, Stephan J. Eidenbenz, Kang G. Shin:
Measuring the effectiveness of infrastructure-level detection of large-scale botnets. IWQoS 2011: 1-9 - 2010
- [j6]Guanhua Yan, Stephan J. Eidenbenz, Sunil Thulasidasan, Pallab Datta, Venkatesh Ramaswamy:
Criticality analysis of Internet infrastructure. Comput. Networks 54(7): 1169-1182 (2010) - [c23]Nandakishore Santhi, Guanhua Yan, Stephan J. Eidenbenz:
CyberSim: Geographic, temporal, and organizational dynamics of malware propagation. WSC 2010: 2876-2887 - 2009
- [j4]Guanhua Yan, Stephan J. Eidenbenz:
Modeling Propagation Dynamics of Bluetooth Worms (Extended Version). IEEE Trans. Mob. Comput. 8(3): 353-368 (2009) - [c21]Duc T. Ha, Guanhua Yan, Stephan J. Eidenbenz, Hung Q. Ngo:
On the effectiveness of structural detection and defense against P2P-based botnets. DSN 2009: 297-306 - [c20]Guanhua Yan, Leticia Cuellar, Stephan J. Eidenbenz, Nicolas W. Hengartner:
Blue-Watchdog: Detecting Bluetooth worm propagation in public areas. DSN 2009: 317-326 - [c19]Konstantinos Pelechrinis, Guanhua Yan, Stephan J. Eidenbenz, Srikanth V. Krishnamurthy:
Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks. INFOCOM 2009: 657-665 - [c18]Guanhua Yan, Stephan J. Eidenbenz, Emanuele Galli:
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. RAID 2009: 202-223 - [c16]Guanhua Yan, Stephan J. Eidenbenz, Bo Sun:
Mobi-watchdog: you can steal, but you can't run! WISEC 2009: 139-150 - 2008
- [c12]Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz:
Dynamic Balancing of Packet Filtering Workloads on Distributed Firewalls. IWQoS 2008: 209-218 - [c11]Guanhua Yan, Stephan J. Eidenbenz:
DDoS Mitigation in Non-cooperative Environments. Networking 2008: 599-611 - [c10]Guanhua Yan, Zhen Xiao, Stephan J. Eidenbenz:
Catching Instant Messaging Worms with Change-Point Detection Techniques. LEET 2008 - 2007
- [c9]Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner, Stephan J. Eidenbenz, Vincent Q. Vu:
Bluetooth worm propagation: mobility pattern matters! AsiaCCS 2007: 32-44 - [c8]Guanhua Yan, Stephan J. Eidenbenz:
Modeling Propagation Dynamics of Bluetooth Worms. ICDCS 2007: 42 - 2006
- [c7]Guanhua Yan, Stephan J. Eidenbenz:
Bluetooth Worms: Models, Dynamics, and Defense Implications. ACSAC 2006: 245-256 - [c5]Guanhua Yan, Stephan J. Eidenbenz:
Sluggish Calendar Queues for Network Simulation. MASCOTS 2006: 127-136
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-14 22:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint