Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Yan-jing HU"'
Autor:
Yan-jing HU, Qing-qi PEI
Publikováno v:
Tongxin xuebao, Vol 38, Pp 118-126 (2017)
The survivability,concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures.In order to compensate for the shortcomings of existing protocol an
Externí odkaz:
https://doaj.org/article/185e15fb90a74abc8be869fdab3cd9d1
Autor:
Yan-jing HU, Qing-qi PEI
Publikováno v:
Tongxin xuebao, Vol 38, Pp 39-48 (2017)
Deep stealth attack behavior in the network protocol becomes a new challenge to network security.In view of the shortcomings of the existing protocol reverse methods in the analysis of protocol behavior,especially the stealth attack behavior mining,a
Externí odkaz:
https://doaj.org/article/4399ebc6b3db48ca8ec6c58a0228b35a
Autor:
Lin-Cui Zhong, Jing-Chun Song, Xing-Ping Deng, Yan-Jing Hu, Long-Ping He, Qing-Wei Lin, Qing-Bo Zeng
Publikováno v:
Medical Journal of Chinese People's Liberation Army, Vol 45, Iss 7, Pp 746-750 (2020)
Objective To determine the prognostic value of thrombomodulin (TM) combined with thrombinantithrombin complex (TAT) in patients with sepsis. Methods A retrospective analysis of the clinical data from 80 patients with sepsis who met the inclusion and
Publikováno v:
Medical Journal of Chinese People's Liberation Army, Vol 44, Iss 12, Pp 1030-1034 (2019)
Objective To explore the clinical characteristics of coagulation dysfunction at different stages in trauma patients. Methods Retrospective analysis of 279 trauma patients admitted to the Intensive Critical Unit of 908th Hospital of Chinese PLA from S
Autor:
Yan-Jing Hu, Xu An Wang
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783030335052
BWCCA
BWCCA
Unknown network protocol’s stealth attack behavior is becoming a new type of attack, which greatly harms the cyber space security. The stealth behaviors are not easy to be detected by existing security measures. Starting with the implementation of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9ed5d4cb40a4767c5ece8cae7d4645e8
https://doi.org/10.1007/978-3-030-33506-9_60
https://doi.org/10.1007/978-3-030-33506-9_60
Publikováno v:
2019 IEEE MTT-S International Microwave Biomedical Conference (IMBioC).
Orbital angular momentum has a broad development prospect as a vector feature of electromagnetic waves. It can not only improve spectrum utilization, but also increase transmission rate. Its good directivity can also play a significant role in the fi
Autor:
Yan-Jing Hu
Publikováno v:
Advances in Intelligent Networking and Collaborative Systems ISBN: 9783319656359
INCoS
INCoS
Unknown network protocol’s Stealth Attack behavior is becoming a new vehicle to conduct invisible cyber attacks. This kind of attack is latent for a long time, and the execution is triggered only under special conditions. As the application layer p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::86e5e3bad145bf6ceb25a779c7cddb9a
https://doi.org/10.1007/978-3-319-65636-6_49
https://doi.org/10.1007/978-3-319-65636-6_49
Autor:
Yan-Jing Hu
Publikováno v:
Advances in Internetworking, Data & Web Technologies ISBN: 9783319594620
EIDWT
EIDWT
Unknown network protocol’s dormant behavior is becoming a new type of stealth attack, which greatly harms the cyber space security, and seriously affects the credibility of network protocols. By studying the characteristics of the dormant behavior,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dd7b36441c4c2b0658761b4a7de030ab
https://doi.org/10.1007/978-3-319-59463-7_30
https://doi.org/10.1007/978-3-319-59463-7_30
Autor:
Yan-Jing Hu
Publikováno v:
Advances on P2P, Parallel, Grid, Cloud and Internet Computing ISBN: 9783319491080
3PGCIC
3PGCIC
Protocol’s dormant behavior are the behaviors that cannot be observed during dynamic analysis, they can only be triggered under particular conditions. In the last few years, several approaches have been proposed to detect anomalous behaviors in mal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::53cd2f8e4dfe48638fb6d47ca80cec17
https://doi.org/10.1007/978-3-319-49109-7_61
https://doi.org/10.1007/978-3-319-49109-7_61
Publikováno v:
Asian Journal of Surgery, Vol 46, Iss 11, Pp 5399-5400 (2023)
Externí odkaz:
https://doaj.org/article/0aa9316e742146d18337e83b8ed367f7