1.REN Ping, LIU Wu, LIU Ke, SUN Donghong, Study on Event-Sequence based Worm Behavior Analysis in Internet, The 1st International Workshop on Complexity and Data Mining IWCDM 2011),24-28 September, 2011 Nanjing, China 2.Ping Ren, Wu Liu, Donghong Sun. Research in Partition-based Data Cube Storage and Parallel Query Technology, The 9th International Conference on Natural Computation,23-25 July 2013 in Shenyang, China. 3.REN Ping, ZHAO Yawei, LIU Wu, SUN Donghong. SSLWA: A Man-In-The-Middle Rootkit Used for Internet Phishing against SSL and TLS encryption Protected Internet Services,4th Cybercrime and Trustworthy Computing Workshop (CTC-2013), 21-22 November 2013,SYDNEY,Australia. 4.Wu Liu, Ping Ren, Haixin Duan, Xing Li, Jianping Wu, PTMBG: A Novel Personalized Trust Model Based on Gravitation for Interacting P2P Entities, Journal of Communication and Computer 8 (2011) 1071-1078 5.LIU Wu, REN Ping, LIU Ke, DUAN Hai-xin,User Cooperation Trust Model and its Application in Network Security Management,2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 26-28 July 2011, Shanghai, China 6.LIU Wu, REN Ping, LIU Ke, DUAN Hai-xin, Behavior-based Malware Analysis and Detection, The 1st International Workshop on Complexity and Data Mining (IWCDM 2011),24-28 September, 2011 Nanjing, China 7.LIU Wu, REN Ping, LIU Ke, DUAN Hai-xin, Intrusion Detection Using SVM. Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 The 7th Int'l Conf. on Wireless Communications, Networking and Mobile Computing, September 23-25,2011, Wuhan, China 8.LIU Wu, REN Ping, TANG Zailiang, XML Data Cube Model Based on Path Calculation, Journal of Computational Information Systems,2012, 8(1):1–8 9.LIU Wu, REN Ping, SUN Donghong, TANG Zailiang, Research in Techniques of Personal Identity Management, 2012 International Conference on Control Engineering and Communication Technology,912-915. 10.LIU Wu, REN Ping, SUN Donghong, Yawei Zhao, WU Jian-ping. Protocol Analysis and Online Forensics in IPv6 Network Environment, Wireless Communications Network and Mobile Computing, 21-23 September 2012, Shanghai, China 11.Wu Liu, Ping Ren, Donghong Sun, and Haibin Xiong. Mobile Intelligent Terminal Based Remote Monitoring and Management System, 3nd Cybercrime and Trustworthy Computing Workshop(CTC2012), 29-31 November 2012, Ballarat, Australia. 12.LIU Wu, REN Ping, SUN Donghong, LIU Ke, WU Jianping. TrustP2PNet: P2P Social Network with Admission Control Model based on Trust, 2013 AASRI Conference on Parallel and Distributed Computing and Systems,ScienceDirect of Elsevier, issn 2212-6716,AASRI Proccedia 5 Vol5.2013,pp:281-286 13.LIU Wu, REN Ping, SUN Donghong, LIU Ke, Analysis and Forensics for Behavior Characteristics of Malware in Internet, 2016 International Conference on Digital Signal Processing (DSP2016), October 16-18, 2016, Beijing 14.LIU Wu, REN Ping, SUN Donghong, LIU Ke, Reputation and Attribute Based Dynamic Access Control Framework in Cloud Computing Environment For Privacy Protection, The 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2016),13-15 August 2016, Changsha, China. |