Search Results - Huachun Zhou
- Showing 1 - 20 results of 20
-
1
A solution for flexible adaption of network services in mobile edge computing by Bohao FENG, Huachun ZHOU
Published in Dianxin kexue (2019-03-01)Get full text
Article -
2
A solution for flexible adaption of network services in mobile edge computing by Bohao FENG, Huachun ZHOU
Published in Dianxin kexue (2019-03-01)Get full text
Article -
3
-
4
Service-oriented security framework for datacenter networks by Teng HU, Guanwen LI, Huachun ZHOU
Published in Dianxin kexue (2018-01-01)Get full text
Article -
5
Two-Stage Intelligent Model for Detecting Malicious DDoS Behavior by Man Li, Huachun Zhou, Yajuan Qin
Published in Sensors (2022-03-01)Get full text
Article -
6
Service-oriented security framework for datacenter networks by Teng HU, Guanwen LI, Huachun ZHOU
Published in Dianxin kexue (2018-01-01)Get full text
Article -
7
Endogenous detection framework of malicious behavior in information network by Zhe TU, Huachun ZHOU, Kun LI, Weilin WANG
Published in Dianxin kexue (2020-10-01)Get full text
Article -
8
Construction of DDoS attacks malicious behavior knowledge base construction by Feiyang LIU, Kun LI, Fei SONG, Huachun ZHOU
Published in Dianxin kexue (2021-11-01)Get full text
Article -
9
An Entropy Based Anomaly Traffic Detection Approach in SDN by Mingxin Wang, Huachun Zhou, Jia Chen, Hongke Zhang
Published in Dianxin kexue (2015-09-01)Get full text
Article -
10
-
11
-
12
-
13
Construction of DDoS attacks malicious behavior knowledge base construction by Feiyang LIU, Kun LI, Fei SONG, Huachun ZHOU
Published in Dianxin kexue (2021-11-01)Get full text
Article -
14
An Entropy Based Anomaly Traffic Detection Approach in SDN by Mingxin Wang, Huachun Zhou, Jia Chen, Hongke Zhang
Published in Dianxin kexue (2015-09-01)Get full text
Article -
15
Multi-type low-rate DDoS attack detection method based on hybrid deep learning by Lijuan LI, Man LI, Hongjun BI, Huachun ZHOU
Published in 网络与信息安全学报 (2022-02-01)Get full text
Article -
16
Endogenous detection framework of malicious behavior in information network by Zhe TU, Huachun ZHOU, Kun LI, Weilin WANG
Published in Dianxin kexue (2020-10-01)Get full text
Article -
17
An Autonomous Deployment Mechanism for AI Security Services by Weilin Wang, Huachun Zhou, Man Li, Jingfu Yan
Published in IEEE Access (2024-01-01)Get full text
Article -
18
-
19
-
20
Cross-Modal Object Detection Based on a Knowledge Update by Yueqing Gao, Huachun Zhou, Lulu Chen, Yuting Shen, Ce Guo, Xinyu Zhang
Published in Sensors (2022-02-01)Get full text
Article
