Follow
Haitao Du
Title
Cited by
Cited by
Year
Attack projection
SJ Yang, H Du, J Holsopple, M Sudit
Cyber Defense and Situational Awareness, 239-261, 2014
502014
Enhancing situation awareness via automated situation assessment
J Holsopple, M Sudit, M Nusinov, DF Liu, H Du, SJ Yang
IEEE Communications Magazine 48 (3), 146-152, 2010
492010
Toward ensemble characterization and projection of multistage cyber attacks
H Du, DF Liu, J Holsopple, SJ Yang
2010 Proceedings of 19th International Conference on Computer Communications …, 2010
412010
Discovering collaborative cyber attack patterns using social network analysis
H Du, SJ Yang
Social Computing, Behavioral-Cultural Modeling and Prediction: 4th …, 2011
372011
Probabilistic inference for obfuscated network attack sequences
H Du, SJ Yang
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
182014
Toward unsupervised classification of non-uniform cyber attack tracks
H Du, C Murphy, J Bean, SJ Yang
2009 12th International Conference on Information Fusion, 1919-1925, 2009
132009
Temporal and spatial analyses for large-scale cyber attacks
H Du, SJ Yang
Handbook of Computational Approaches to Counterterrorism, 559-578, 2012
122012
Who shall we follow in twitter for cyber vulnerability?
B Cui, S Moskal, H Du, SJ Yang
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th …, 2013
82013
Characterizing transition behaviors in internet attack sequences
H Du, SJ Yang
2011 Proceedings of 20th International Conference on Computer Communications …, 2011
72011
Cyber insider mission detection for situation awareness
H Du, C Wang, T Zhang, SJ Yang, J Choi, P Liu
Intelligent Methods for Cyber Warfare, 201-217, 2015
62015
Face recognition business model and method for identifying perpetrators of atm fraud
BJ Roof, AS Yeh, HA Mizes, H Du, M Yang
US Patent US20160125404 A1, 2014
62014
Probabilistic Modeling and Inference for Obfuscated Network Attack Sequences
H Du
Rochester Institute of Technology, 2014
62014
Sequential modeling for obfuscated network attack action sequences
H Du, SJ Yang
2013 IEEE Conference on Communications and Network Security (CNS), 389-390, 2013
42013
Perceptions of housing stability and fertility intentions among public housing renters in Guangzhou, China
H Du, EC Hui, L Chen
Cities 144, 104643, 2024
22024
Design of TPM chip against physical attacks
X Chen, H Du, G Li, J Ma
Journal of Wuhan University(Natural Science Edition) 56 (2), 143-146, 2010
22010
Probabilistic modeling and inference for obfuscated cyber attack sequences
H Du, SJ Yang
arXiv preprint arXiv:1809.01562, 2018
12018
Do Long Commutes Discourage Fertility Intentions Among Young Public Housing Renters in Guangzhou, China?
H Du, EC Hui, L Chen
Housing Policy Debate, 1-28, 2024
2024
Family structure of migrant workers and long‐term local settlement intention in China
Y Wu, H Du, P Li, H Ouyang
Population, Space and Place, e42, 2023
2023
Method and apparatus for calculating a transaction quality score of a merchant
BJ Roof, ASS Yeh, HA Mizes, H Du
US Patent US20160019613 A1, 2016
2016
Method and apparatus for verifying a validity of communication from a fraud detection service
BJ Roof, ASS Yeh, HA Mizes, H Du
US Patent US20150269662 A1, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20