Skip to main content

and
  1. No Access

    Article

    Social Influence Study in Online Networks: A Three-Level Review

    Social network analysis (SNA) views social relationships in terms of network theory consisting of nodes and ties. Nodes are the individual actors within the networks; ties are the relationships between the act...

    Hui Li, Jiang-Tao Cui, Jian-Feng Ma in Journal of Computer Science and Technology (2015)

  2. No Access

    Article

    Practical secret sharing scheme realizing generalized adversary structure

    Most existing secret sharing schemes are constructed to realize general access structure, which is defined in terms of authorized groups of participants, and is unable to be applied directly to the design of i...

    Yuan-Bo Guo, Jian-Feng Ma in Journal of Computer Science and Technology (2004)

  3. No Access

    Chapter and Conference Paper

    Enhancing the Content of the Intrusion Alerts Using Logic Correlation

    To solve the problem of the alert flooding and information semantics in the existing IDS, the approach using the logic correction to enhance the content of the alerts is presented. The Chronicle based on time ...

    Liang-Min Wang, Jian-Feng Ma, Yong-Zhao Zhan in Content Computing (2004)

  4. No Access

    Chapter and Conference Paper

    Availability Analysis and Comparison of Different Intrusion-Tolerant Systems

    Based on the adopted redundancy techniques the intrusion-tolerant systems are classified into three kinds: resource redundancy based systems, complete information redundancy based systems, and partial informat...

    Chao Wang, Jian-Feng Ma in Content Computing (2004)