Attack projection SJ Yang, H Du, J Holsopple, M Sudit Cyber Defense and Situational Awareness, 239-261, 2014 | 50 | 2014 |
Enhancing situation awareness via automated situation assessment J Holsopple, M Sudit, M Nusinov, DF Liu, H Du, SJ Yang IEEE Communications Magazine 48 (3), 146-152, 2010 | 49 | 2010 |
Toward ensemble characterization and projection of multistage cyber attacks H Du, DF Liu, J Holsopple, SJ Yang 2010 Proceedings of 19th International Conference on Computer Communications …, 2010 | 41 | 2010 |
Discovering collaborative cyber attack patterns using social network analysis H Du, SJ Yang Social Computing, Behavioral-Cultural Modeling and Prediction: 4th …, 2011 | 37 | 2011 |
Probabilistic inference for obfuscated network attack sequences H Du, SJ Yang 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014 | 18 | 2014 |
Toward unsupervised classification of non-uniform cyber attack tracks H Du, C Murphy, J Bean, SJ Yang 2009 12th International Conference on Information Fusion, 1919-1925, 2009 | 13 | 2009 |
Temporal and spatial analyses for large-scale cyber attacks H Du, SJ Yang Handbook of Computational Approaches to Counterterrorism, 559-578, 2012 | 12 | 2012 |
Who shall we follow in twitter for cyber vulnerability? B Cui, S Moskal, H Du, SJ Yang Social Computing, Behavioral-Cultural Modeling and Prediction: 6th …, 2013 | 8 | 2013 |
Characterizing transition behaviors in internet attack sequences H Du, SJ Yang 2011 Proceedings of 20th International Conference on Computer Communications …, 2011 | 7 | 2011 |
Cyber insider mission detection for situation awareness H Du, C Wang, T Zhang, SJ Yang, J Choi, P Liu Intelligent Methods for Cyber Warfare, 201-217, 2015 | 6 | 2015 |
Face recognition business model and method for identifying perpetrators of atm fraud BJ Roof, AS Yeh, HA Mizes, H Du, M Yang US Patent US20160125404 A1, 2014 | 6 | 2014 |
Probabilistic Modeling and Inference for Obfuscated Network Attack Sequences H Du Rochester Institute of Technology, 2014 | 6 | 2014 |
Sequential modeling for obfuscated network attack action sequences H Du, SJ Yang 2013 IEEE Conference on Communications and Network Security (CNS), 389-390, 2013 | 4 | 2013 |
Perceptions of housing stability and fertility intentions among public housing renters in Guangzhou, China H Du, EC Hui, L Chen Cities 144, 104643, 2024 | 2 | 2024 |
Design of TPM chip against physical attacks X Chen, H Du, G Li, J Ma Journal of Wuhan University(Natural Science Edition) 56 (2), 143-146, 2010 | 2 | 2010 |
Probabilistic modeling and inference for obfuscated cyber attack sequences H Du, SJ Yang arXiv preprint arXiv:1809.01562, 2018 | 1 | 2018 |
Do Long Commutes Discourage Fertility Intentions Among Young Public Housing Renters in Guangzhou, China? H Du, EC Hui, L Chen Housing Policy Debate, 1-28, 2024 | | 2024 |
Family structure of migrant workers and long‐term local settlement intention in China Y Wu, H Du, P Li, H Ouyang Population, Space and Place, e42, 2023 | | 2023 |
Method and apparatus for calculating a transaction quality score of a merchant BJ Roof, ASS Yeh, HA Mizes, H Du US Patent US20160019613 A1, 2016 | | 2016 |
Method and apparatus for verifying a validity of communication from a fraud detection service BJ Roof, ASS Yeh, HA Mizes, H Du US Patent US20150269662 A1, 2015 | | 2015 |