Teaching and learning online with wikis N Augar, R Raitman, W Zhou Beyond the comfort zone: proceedings of the 21st ASCILITE Conference, Perth …, 2004 | 576 | 2004 |
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures Y Yu, K Li, W Zhou, P Li Journal of Network and computer Applications 35 (3), 867-880, 2012 | 397 | 2012 |
Low-rate DDoS attacks detection and traceback by using new information metrics Y Xiang, K Li, W Zhou IEEE transactions on information forensics and security 6 (2), 426-437, 2011 | 342 | 2011 |
Network traffic classification using correlation information J Zhang, Y Xiang, Y Wang, W Zhou, Y Guan Parallel and Distributed Systems, IEEE Transactions on 24 (1), 104-117, 2013 | 325 | 2013 |
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks A Chonka, Y Xiang, W Zhou, A Bonti Journal of Network and Computer Applications 34 (4), 1097-1107, 2011 | 281 | 2011 |
Robust network traffic classification J Zhang, X Chen, Y Xiang, W Zhou, J Wu IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014 | 257 | 2014 |
Discriminating DDoS attacks from flash crowds using flow correlation coefficient S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang IEEE transactions on parallel and distributed systems 23 (6), 1073-1080, 2011 | 252 | 2011 |
Flexible deterministic packet marking: An IP traceback system to find the real source of attacks Y Xiang, W Zhou, M Guo IEEE Transactions on Parallel and Distributed Systems 20 (4), 567-580, 2008 | 218 | 2008 |
Traceback of DDoS attacks using entropy variations S Yu, W Zhou, R Doss, W Jia IEEE transactions on parallel and distributed systems 22 (3), 412-425, 2010 | 217 | 2010 |
Employing wikis for online collaboration in the e-learning environment: Case study R Raitman, N Augar, W Zhou Third International Conference on Information Technology and Applications …, 2005 | 193 | 2005 |
Internet traffic classification by aggregating correlated naive bayes predictions J Zhang, C Chen, Y Xiang, W Zhou Information Forensics and Security, IEEE Transactions on 8 (1), 5-15, 2013 | 164 | 2013 |
Modeling the propagation of worms in networks: A survey Y Wang, S Wen, Y Xiang, W Zhou IEEE Communications Surveys & Tutorials 16 (2), 942-960, 2013 | 154 | 2013 |
Differentially private data publishing and analysis: A survey T Zhu, G Li, W Zhou, SY Philip IEEE Transactions on Knowledge and Data Engineering 29 (8), 1619-1638, 2017 | 146 | 2017 |
A manifesto for future generation cloud computing: Research directions for the next decade R Buyya, SN Srirama, G Casale, R Calheiros, Y Simmhan, B Varghese, ... ACM computing surveys (CSUR) 51 (5), 1-38, 2018 | 139 | 2018 |
Identifying propagation sources in networks: State-of-the-art and comparative studies J Jiang, S Wen, S Yu, Y Xiang, W Zhou IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016 | 134 | 2016 |
A sword with two edges: Propagation studies on both positive and negative information in online social networks S Wen, M Haghighi, C Chen, Y Xiang, W Zhou, W Jia IEEE Transactions on Computers 64 (3), 640-653, 2014 | 132 | 2014 |
Correlated differential privacy: Hiding information in non-IID data set T Zhu, P Xiong, G Li, W Zhou IEEE Transactions on Information Forensics and Security 10 (2), 229-242, 2014 | 127 | 2014 |
Chaos theory based detection against network mimicking DDoS attacks A Chonka, J Singh, W Zhou IEEE Communications Letters 13 (9), 717-719, 2009 | 117 | 2009 |
Detection and defense of application-layer DDoS attacks in backbone web traffic W Zhou, W Jia, S Wen, Y Xiang, W Zhou Future Generation Computer Systems 38, 36-46, 2014 | 114 | 2014 |
Malwise--An Effective and Efficient Classification System for Packed and Polymorphic Malware S Cesare, Y Xiang, W Zhou Computers, IEEE Transactions on 62 (6), 1193-1206, 2012 | 112 | 2012 |