Modeling the spread of active worms Z Chen, L Gao, K Kwiat IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 775 | 2003 |
Spatial-temporal modeling of malware propagation in networks Z Chen, C Ji IEEE Transactions on Neural Networks 16 (5), 1291-1303, 2005 | 177 | 2005 |
Modeling primary user emulation attacks and defenses in cognitive radio networks Z Chen, T Cooklev, C Chen, C Pomalaza-Ráez 2009 IEEE 28th International Performance Computing and Communications …, 2009 | 147 | 2009 |
Spatial-temporal characteristics of internet malicious sources Z Chen, C Ji, P Barford IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 2306-2314, 2008 | 76 | 2008 |
A self-learning worm using importance scanning Z Chen, C Ji Proceedings of the 2005 ACM workshop on Rapid malcode, 22-29, 2005 | 74 | 2005 |
Optimal worm-scanning method using vulnerable-host distributions Z Chen, C Ji International Journal of Security and Networks 2 (1-2), 71-80, 2007 | 67 | 2007 |
An information-theoretic view of network-aware malware attacks Z Chen, C Ji IEEE Transactions on Information Forensics and Security 4 (3), 530-541, 2009 | 64 | 2009 |
Measuring network-aware worm spreading ability Z Chen, C Ji IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 51 | 2007 |
Importance-scanning worm using vulnerable-host distribution. Z Chen, C Ji GLOBECOM, 6, 2005 | 46 | 2005 |
Comments on" Modeling TCP reno performance: a simple model and its empirical Validation" Z Chen, T Bu, M Ammar, D Towsley IEEE/ACM Transactions on Networking 14 (2), 451-453, 2006 | 44 | 2006 |
Understanding localized-scanning worms Z Chen, C Chen, C Ji 2007 IEEE International Performance, Computing, and Communications …, 2007 | 41 | 2007 |
Modeling and defending against internet worm attacks Z Chen Georgia Institute of Technology, 2007 | 29 | 2007 |
Modeling the spread of influence for independent cascade diffusion process in social networks Z Chen, K Taylor 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 21 | 2017 |
Exploiting contact spatial dependency for opportunistic message forwarding C Chen, Z Chen IEEE transactions on Mobile Computing 8 (10), 1397-1411, 2009 | 21 | 2009 |
Darknet-based inference of internet worm temporal characteristics Q Wang, Z Chen, C Chen IEEE Transactions on Information Forensics and Security 6 (4), 1382-1393, 2011 | 18 | 2011 |
On the robustness of the botnet topology formed by worm infection Q Wang, Z Chen, C Chen, N Pissinou 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 18 | 2010 |
Enhancing intrusion detection system with proximity information Z Zhuang, Y Li, Z Chen International Journal of Security and Networks 5 (4), 207-219, 2010 | 17 | 2010 |
Understanding divide-conquer-scanning worms Y Li, Z Chen, C Chen 2008 IEEE International Performance, Computing and Communications Conference …, 2008 | 17 | 2008 |
Evaluating contacts for routing in highly partitioned mobile networks C Chen, Z Chen Proceedings of the 1st international MobiSys workshop on Mobile …, 2007 | 16 | 2007 |
An Efficient Spectral Selection of M Giants Using XGBoost Z Yi, Z Chen, J Pan, L Yue, Y Lu, J Li, AL Luo The Astrophysical Journal 887 (2), 241, 2019 | 14 | 2019 |