Yu Yao (姚羽)
Yu Yao (姚羽)
Prof. of CS, Northeastern Univ. (东北大学的计算机科学教授)
Verified email at mail.neu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Pulse quarantine strategy of internet worm propagation: modeling and analysis
Y Yao, L Guo, H Guo, G Yu, F Gao, X Tong
Computers & Electrical Engineering 38 (5), 1047-1061, 2012
552012
Hopf bifurcation in an Internet worm propagation model with time delay in quarantine
Y Yao, X Xie, H Guo, G Yu, FX Gao, X Tong
Mathematical and Computer Modelling 57 (11-12), 2635-2646, 2013
492013
Anomaly intrusion detection approach using hybrid MLP/CNN neural network
Y Yao, Y Wei, F Gao, G Yu
Sixth international conference on intelligent systems design and …, 2006
442006
Analysis of a delayed Internet worm propagation model with impulsive quarantine strategy
Y Yao, X Feng, W Yang, W Xiang, F Gao
Mathematical Problems in Engineering 2014, 2014
282014
Research of a potential worm propagation model based on pure P2P principle
Y Yao, X Luo, F Gao, S Ai
2006 International Conference on Communication Technology, 1-4, 2006
192006
Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy
Y Yao, W Xiang, A Qu, G Yu, F Gao
Discrete Dynamics in Nature and Society 2012, 2012
162012
Stability analysis of P2P worm propagation model with dynamic quarantine defense
W Yang, G Chang, Y Yao, X Shen
Journal of networks 6 (1), 153, 2011
162011
An epidemic model of computer worms with time delay and variable infection rate
Y Yao, Q Fu, W Yang, Y Wang, C Sheng
Security and Communication Networks 2018, 2018
122018
An immunization strategy for social network worms based on network vertex influence
W Yang, H Wang, Y Yao
China Communications 12 (7), 154-166, 2015
102015
Detecting and Defending against Worm Attacks Using Bot-honeynet
Y Yao, J Lv, F Gao, G Yu, Q Deng
2009 Second International Symposium on Electronic Commerce and Security 1 …, 2009
102009
IDS evaluation approach based on ROC curves
Y Yao, F Gao, G Yu
JOURNAL-CHINA INSTITUTE OF COMMUNICATIONS 26 (1A), 113, 2005
8*2005
A Time-Delayed Misuse Intrusion Detection Model Based on Chaotic Neuron
Y Yao, F Gao, G Yu
Acta Electronica Sinica 32 (8), 1370-1373, 2004
8*2004
Discrete-time simulation method for worm propagation model with pulse quarantine strategy
Y Yao, H Guo, G Yu, F Gao
Procedia Engineering 15, 4162-4167, 2011
72011
The Worm Propagation Model with Pulse Quarantine Strategy
Y Yao, H Guo, F Gao, G Yu
2010 International Conference on Multimedia Information Networking and …, 2010
72010
A WAW model of P2P-based anti-worm
Y Yao, L Wu, F Gao, W Yang, G Yu
2008 IEEE International Conference on Networking, Sensing and Control, 1131-1136, 2008
72008
A propagation model with defensive measures for PLC-PC worms in industrial networks
Y Yao, C Sheng, Q Fu, H Liu, D Wang
Applied Mathematical Modelling 69, 696-713, 2019
62019
Modeling and analysis of bifurcation in a delayed worm propagation model
Y Yao, N Zhang, W Xiang, G Yu, F Gao
Journal of Applied Mathematics 2013, 2013
62013
Modelling, analysis and containment of passive worms in P2P networks
W Yang, Y Gao, Z Zhu, G Chang, Y Yao
International Journal of Internet Protocol Technology 8 (2-3), 130-142, 2014
52014
Application of a hybrid feedforward neural network to intrusion detection
Y Yao, F Gao, Q Deng, G Yu, S Zhang
Control and Decision 22 (4), 432, 2007
5*2007
基于纯 P2P 原理的蠕虫传播模型的研究
罗兴睿, 姚羽, 高福祥
通信学报 11, 2006
52006
The system can't perform the operation now. Try again later.
Articles 1–20