Anomaly intrusion detection approach using hybrid MLP/CNN neural network Y Yao, Y Wei, FX Gao, Y Ge Sixth international conference on intelligent systems design and …, 2006 | 62 | 2006 |
Pulse quarantine strategy of internet worm propagation: modeling and analysis Y Yao, L Guo, H Guo, G Yu, F Gao, X Tong Computers & Electrical Engineering 38 (5), 1047-1061, 2012 | 58 | 2012 |
Hopf bifurcation in an Internet worm propagation model with time delay in quarantine Y Yao, X Xie, H Guo, G Yu, FX Gao, X Tong Mathematical and Computer Modelling 57 (11-12), 2635-2646, 2013 | 53 | 2013 |
Analysis of a delayed Internet worm propagation model with impulsive quarantine strategy Y Yao, X Feng, W Yang, W Xiang, F Gao Mathematical Problems in Engineering 2014, 2014 | 30 | 2014 |
An epidemic model of computer worms with time delay and variable infection rate Y Yao, Q Fu, W Yang, Y Wang, C Sheng Security and Communication Networks 2018, 2018 | 25 | 2018 |
A cyber-physical model for SCADA system and its intrusion detection C Sheng, Y Yao, Q Fu, W Yang Computer Networks 185, 107677, 2021 | 24 | 2021 |
Research of a potential worm propagation model based on pure P2P principle Y Yao, X Luo, F Gao, S Ai 2006 international conference on communication technology, 1-4, 2006 | 22 | 2006 |
A propagation model with defensive measures for PLC-PC worms in industrial networks Y Yao, C Sheng, Q Fu, H Liu, D Wang Applied Mathematical Modelling 69, 696-713, 2019 | 20 | 2019 |
Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy Y Yao, W Xiang, A Qu, G Yu, F Gao Discrete Dynamics in Nature and Society 2012, 2012 | 18 | 2012 |
Stability analysis of P2P worm propagation model with dynamic quarantine defense W Yang, G Chang, Y Yao, X Shen Journal of networks 6 (1), 153, 2011 | 17 | 2011 |
An immunization strategy for social network worms based on network vertex influence W Yang, H Wang, Y Yao China Communications 12 (7), 154-166, 2015 | 16 | 2015 |
Detecting and Defending against Worm Attacks Using Bot-honeynet Y Yao, J Lv, F Gao, G Yu, Q Deng 2009 Second International Symposium on Electronic Commerce and Security 1 …, 2009 | 10 | 2009 |
Interplay between malware epidemics and honeynet potency in industrial control system network Q Fu, Y Yao, C Sheng, W Yang IEEE Access 8, 81582-81593, 2020 | 8 | 2020 |
Discrete-time simulation method for worm propagation model with pulse quarantine strategy Y Yao, H Guo, G Yu, F Gao Procedia Engineering 15, 4162-4167, 2011 | 8 | 2011 |
IDS evaluation approach based on ROC curves Y Yao, F Gao, G Yu JOURNAL-CHINA INSTITUTE OF COMMUNICATIONS 26 (1A), 113, 2005 | 8* | 2005 |
The Worm Propagation Model with pulse Quarantine Strategy Y Yao, H Guo, F Gao, G Yu 2010 International Conference on Multimedia Information Networking and …, 2010 | 7 | 2010 |
A WAW model of P2P-based anti-worm Y Yao, L Wu, F Gao, W Yang, G Yu 2008 IEEE International Conference on Networking, Sensing and Control, 1131-1136, 2008 | 7 | 2008 |
Modelling, analysis and containment of passive worms in P2P networks W Yang, Y Gao, Z Zhu, G Chang, Y Yao International Journal of Internet Protocol Technology 8 (2-3), 130-142, 2014 | 6 | 2014 |
Modeling and analysis of bifurcation in a delayed worm propagation model Y Yao, N Zhang, W Xiang, G Yu, F Gao Journal of Applied Mathematics 2013, 2013 | 6 | 2013 |
Quantum codes and entanglement-assisted quantum codes derived from one-generator quasi-twisted codes Y Yao, Y Ma, J Lv International Journal of Theoretical Physics 60, 1077-1089, 2021 | 5 | 2021 |