Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Enhancing the Content of the Intrusion Alerts Using Logic Correlation

    To solve the problem of the alert flooding and information semantics in the existing IDS, the approach using the logic correction to enhance the content of the alerts is presented. The Chronicle based on time ...

    Liang-Min Wang, Jian-Feng Ma, Yong-Zhao Zhan in Content Computing (2004)

  2. No Access

    Chapter and Conference Paper

    Availability Analysis and Comparison of Different Intrusion-Tolerant Systems

    Based on the adopted redundancy techniques the intrusion-tolerant systems are classified into three kinds: resource redundancy based systems, complete information redundancy based systems, and partial informat...

    Chao Wang, Jian-Feng Ma in Content Computing (2004)

  3. No Access

    Article

    Trust-based service composition and selection in service oriented architecture

    Service composition is a complex task that has attracted an increasing attention. It is significant to develop an approach to evaluate the trust of a composite service so that the client can obtain a satisfact...

    **g-**g Guo, Jian-Feng Ma, **n-**n Guo in Peer-to-Peer Networking and Applications (2018)