Anomaly intrusion detection approach using hybrid MLP/CNN neural network Y Yao, Y Wei, F Gao, Y Ge Sixth international conference on intelligent systems design and …, 2006 | 74 | 2006 |
Pulse quarantine strategy of internet worm propagation: Modeling and analysis Y Yao, L Guo, H Guo, G Yu, F Gao, X Tong Computers & Electrical Engineering 38 (5), 1047-1061, 2012 | 57 | 2012 |
Hopf bifurcation in an Internet worm propagation model with time delay in quarantine Y Yao, X Xie, H Guo, G Yu, FX Gao, X Tong Mathematical and Computer Modelling 57 (11-12), 2635-2646, 2013 | 56 | 2013 |
A cyber-physical model for SCADA system and its intrusion detection C Sheng, Y Yao, Q Fu, W Yang Computer Networks 185, 107677, 2021 | 45 | 2021 |
An epidemic model of computer worms with time delay and variable infection rate Y Yao, Q Fu, W Yang, Y Wang, C Sheng Security and Communication Networks 2018 (1), 9756982, 2018 | 32 | 2018 |
Analysis of a delayed Internet worm propagation model with impulsive quarantine strategy Y Yao, X Feng, W Yang, W Xiang, F Gao Mathematical Problems in Engineering 2014 (1), 369360, 2014 | 31 | 2014 |
A propagation model with defensive measures for PLC-PC worms in industrial networks Y Yao, C Sheng, Q Fu, H Liu, D Wang Applied Mathematical Modelling 69, 696-713, 2019 | 29 | 2019 |
Research of a potential worm propagation model based on pure P2P principle Y Yao, X Luo, F Gao, S Ai 2006 international conference on communication technology, 1-4, 2006 | 24 | 2006 |
An immunization strategy for social network worms based on network vertex influence W Yang, H Wang, Y Yao China Communications 12 (7), 154-166, 2015 | 20 | 2015 |
Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy Y Yao, W Xiang, A Qu, G Yu, F Gao Discrete Dynamics in Nature and Society 2012 (1), 304868, 2012 | 18 | 2012 |
Stability analysis of P2P worm propagation model with dynamic quarantine defense W Yang, G Chang, Y Yao, X Shen Journal of networks 6 (1), 153, 2011 | 17 | 2011 |
NeuPot: A neural network-based honeypot for detecting cyber threats in industrial control systems Y Shan, Y Yao, T Zhao, W Yang IEEE Transactions on Industrial Informatics 19 (10), 10512-10522, 2023 | 14 | 2023 |
Unknown attack traffic classification in scada network using heuristic clustering technique C Sheng, Y Yao, W Li, W Yang, Y Liu IEEE Transactions on Network and Service Management 20 (3), 2625-2638, 2023 | 14 | 2023 |
A feature selection based on genetic algorithm for intrusion detection of industrial control systems Y Fang, Y Yao, X Lin, J Wang, H Zhai Computers & Security 139, 103675, 2024 | 12 | 2024 |
Interplay between malware epidemics and honeynet potency in industrial control system network Q Fu, Y Yao, C Sheng, W Yang IEEE Access 8, 81582-81593, 2020 | 12 | 2020 |
Study on the intelligent honeynet model for containing the spread of industrial viruses C Sheng, Y Yao, Q Fu, W Yang, Y Liu Computers & Security 111, 102460, 2021 | 11 | 2021 |
New binary quantum codes constructed from quasi-cyclic codes C Guan, R Li, L Lu, Y Yao International Journal of Theoretical Physics 61 (6), 172, 2022 | 10 | 2022 |
Discrete-time simulation method for worm propagation model with pulse quarantine strategy Y Yao, H Guo, G Yu, F Gao Procedia Engineering 15, 4162-4167, 2011 | 9 | 2011 |
Detecting and Defending against Worm Attacks Using Bot-honeynet Y Yao, J Lv, F Gao, G Yu, Q Deng 2009 Second International Symposium on Electronic Commerce and Security 1 …, 2009 | 9 | 2009 |
A WAW model of P2P-based anti-worm Y Yao, L Wu, F Gao, W Yang, G Yu 2008 IEEE International Conference on Networking, Sensing and Control, 1131-1136, 2008 | 8 | 2008 |