1. An architecture for intrusion detection using honey pot[C]//Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 03EX693);Tian Z H;IEEE,2003
2. Reduction of false positives in intrusion detection via adaptive alert classifier[C]//2008 International Conference on Information and Automation;Tian Z;IEEE
3. Automatically traceback RDP-based targeted ransomware attacks[J];Wang Z H;Wireless Communications and Mobile Computing,2018
4. A digital evidence fusion method in network forensics systems with Dempster-shafer theory
5. Optimal network security strengthening using attack-defense game model[C]//2009 Sixth International Conference on Information Technology;Jiang W;New Generations. IEEE