Wanlei Zhou
Wanlei Zhou
Professor and Head of School of Computer Science in University of Technology Sydney
Verified email at uts.edu.au - Homepage
TitleCited byYear
Teaching and learning online with wikis
N Augar, R Raitman, W Zhou
Beyond the comfort zone: proceedings of the 21st ASCILITE Conference, Perth …, 2004
5502004
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Y Yu, K Li, W Zhou, P Li
Journal of Network and computer Applications 35 (3), 867-880, 2012
3512012
Low-rate DDoS attacks detection and traceback by using new information metrics
Y Xiang, K Li, W Zhou
IEEE transactions on information forensics and security 6 (2), 426-437, 2011
2922011
Network traffic classification using correlation information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Guan
Parallel and Distributed Systems, IEEE Transactions on 24 (1), 104-117, 2013
2662013
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
A Chonka, Y Xiang, W Zhou, A Bonti
Journal of Network and Computer Applications 34 (4), 1097-1107, 2011
2602011
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang
IEEE Transactions on Parallel and Distributed Systems 23 (6), 1073-1080, 2011
2172011
Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
Y Xiang, W Zhou, M Guo
IEEE Transactions on Parallel and Distributed Systems 20 (4), 567-580, 2008
1992008
Traceback of DDoS attacks using entropy variations
S Yu, W Zhou, R Doss, W Jia
IEEE Transactions on Parallel and Distributed Systems 22 (3), 412-425, 2010
1942010
Employing wikis for online collaboration in the e-learning environment: Case study
R Raitman, N Augar, W Zhou
Third International Conference on Information Technology and Applications …, 2005
1792005
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014
1762014
Internet traffic classification by aggregating correlated naive bayes predictions
J Zhang, C Chen, Y Xiang, W Zhou
Information Forensics and Security, IEEE Transactions on 8 (1), 5-15, 2013
1392013
Modeling the propagation of worms in networks: A survey
Y Wang, S Wen, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 16 (2), 942-960, 2013
1252013
A sword with two edges: Propagation studies on both positive and negative information in online social networks
S Wen, M Haghighi, C Chen, Y Xiang, W Zhou, W Jia
IEEE Transactions on Computers 64 (3), 640-653, 2014
1042014
Chaos theory based detection against network mimicking DDoS attacks
A Chonka, J Singh, W Zhou
IEEE Communications Letters 13 (9), 717-719, 2009
1042009
Identifying propagation sources in networks: State-of-the-art and comparative studies
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016
1032016
Malwise--An Effective and Efficient Classification System for Packed and Polymorphic Malware
S Cesare, Y Xiang, W Zhou
Computers, IEEE Transactions on 62 (6), 1193-1206, 2012
1002012
Detection and defense of application-layer DDoS attacks in backbone web traffic
W Zhou, W Jia, S Wen, Y Xiang, W Zhou
Future Generation Computer Systems 38, 36-46, 2014
992014
Information theory based detection against network behavior mimicking DDoS attacks
S Yu, W Zhou, R Doss
IEEE Communications Letters 12 (4), 318-321, 2008
992008
Modeling propagation dynamics of social network worms
S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia
IEEE Transactions on Parallel and Distributed Systems 24 (8), 1633-1643, 2012
972012
A dual-channel time-spread echo method for audio watermarking
Y Xiang, I Natgunanathan, D Peng, W Zhou, S Yu
IEEE Transactions on Information Forensics and Security 7 (2), 383-392, 2011
972011
The system can't perform the operation now. Try again later.
Articles 1–20