Home
Add
Open Access Books
Get on Google Play
Click here to donate your five minutes and submit the table of contents of a book.
Search from the table of contents of 2.5 million books
Every Word
Any Word
Exact Word
Exact Phrase
Criteria
Table of Contents
Chapter Authors
──────────
Books
Book Authors
Publisher
Publishing Date
──────────
Thesis
Thesis Authors
Field
Search
Search I can Access
Query minimum length 2 and maximum length 100
Advanced Search (Beta)
Home
> Pu Yiguo
"Pu Yiguo" appeared in Books and Chapters
Books
Chapters
10
20
30
50
100
200
500
entries per page
Filter:
Showing 0 to 0 of 0 entries
Book
Author(s)
Year
Publisher
No data available in table
Boook
Author(s)
Year
Publisher
Showing 0 to 0 of 0 entries
«
‹
›
»
10
20
30
50
100
200
500
entries per page
Filter:
Showing 1 to 6 of 6 entries
Chapter
Author(s)
Book
Book Authors
Year
Publisher
A Clustering Approach for Detecting Auto-generated Botnet Domains
Yang Pu
;
Xiaojun Chen
;
Yiguo Pu
;
JinQiao Shi
Applications and Techniques in Information Security: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings
Wenjia Niu
;
Gang Li
;
Jiqiang Liu
;
Jianlong Tan
;
Li Guo
;
Zhen Han
;
Lynn Batten
1st ed. 2015
Springer Berlin Heidelberg
A Hierarchical Method for Clustering Binary Text Image
Yiguo Pu
;
Jinqiao Shi
;
Li Guo
Trustworthy Computing and Services: International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papers
Yuyu Yuan
;
Xu Wu
;
Yueming Lu
2013
Springer Berlin Heidelberg
An Intent-Driven Masquerader Detection Framework Based on Data Fusion
Chen Xiaojun
;
Shi Jinqiao
;
Pu Yiguo
;
Zhang Haoliang
Trustworthy Computing and Services: International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papers
Yuyu Yuan
;
Xu Wu
;
Yueming Lu
2013
Springer Berlin Heidelberg
CAS: Content Attribution System for Network Forensics
Yan Chen
;
Yiguo Pu
;
Xiaojun Chen
;
Jinqiao Shi
;
Xiaojie Yu
Trustworthy Computing and Services: International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers
Lu Yueming
;
Wu Xu
;
Zhang Xi
2015
Springer Berlin Heidelberg
Detecting Insider Threat Based on Document Access Behavior Analysis
Rui Zhang
;
Xiaojun Chen
;
Jinqiao Shi
;
Fei Xu
;
Yiguo Pu
Web Technologies and Applications: APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014, Proceedings
Weihong Han
;
Zi Huang
;
Changjun Hu
;
Hongli Zhang
;
Li Guo
2014
Springer International Publishing
Winnowing Double Structure for Wildcard Query in Payload Attribution
Yichen Wei
;
Fei Xu
;
Xiaojun Chen
;
Yiguo Pu
;
Jinqiao Shi
;
Sihan Qing
Information Security: 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings
Sherman S.M. Chow
;
Jan Camenisch
;
Lucas C.K. Hui
;
Siu Ming Yiu
2014
Springer International Publishing
Chapter
Author(s)
Book
Book Authors
Year
Publisher
Showing 1 to 6 of 6 entries
«
‹
1
›
»