代表性论文:
1.Zhang Cheng, Xia Chunhe, Li Yu,Wang Haiquan, Li Xiaojian. “A Hotspot Based Probabilistic Cache PlacementPolicy for ICN in MANETs.”EURASIP Journal on Wireless Communications and Networking, 2019,DOI :10.1186/s13638-019-1466-5(onlinepublished).
2.Tianbo Wang,Chunhe Xia,Sheng Wen,Hui Xue,Yang Xiang,Shouzhong Tu.“SADI: A Novel Model to Study the Propagation of Social Worms in HierarchicalNetworks.” IEEE Transactions on Dependable and Secure Computing.2019,16(1):142-155
3.Tianbo Wang,Chunhe Xia,Li Zhong, LiuXiaochen, Xiang Yang. “The Spatial-temporalPerspective: The Study of the Propagation of Modern Social Worm.” IEEETransactions on Information Forensics & Security, 2017,12(11):2558-2573
4.Yang Bo,Chunhe Xia, Zhigang Zhang, Xinzheng Lu .“On the satisfiability ofauthorization requirements in business process.” Front. Comput. Sci.,2017,11(3):528-540
5.Wang,Tianbo, Xia Chunhe, Jia, Qiong. “The temporal characteristic of humanmobility: modeling and analysis of social worm propagation.” IEEECommunications Letters, 2015,19(7):1169-1172
6.YUYang ,Xia Chunhe ,LI Shiying,LI Zhong,“Trusttype based trust bootstrapping model of computer network collaborativedefense.” China Communications, 2015,12(12):134-146
7.Luo,Yang,Xia, Chunhe,Lv, Liangshuang,Wei,Zhao,Li, Yazhuo. “Modeling,Conflict Detection and Verification of a New Virtualization RBAC Framework.” Security and Communication Networks.DOI: 10.1002/sec.1025
8.LiangXiaoyan,Xia Chunhe,Jiao Jian,Hu Junshun,LiXiaojian,“Modeling and Global Conflict Analysis of Firewall Policy.” China Communications, 2014,11(5):124-135
9.魏昭,夏春和,何冰,焦健,马心意,一种移动Ad Hoc网络可生存性模型建模及仿真验证方法,计算机学报,2013,36(07):1465-1474.
10.LiuXiaochen,Xia Chunhe,Cao Jiajin,Gao Jinghua,ASecurity Assessment Framework and Selection Method for Outsourcing CloudService,International Journal of Security & Its Applications,2014,8(6):375-388.
11.Xia, Chunhe ,Liang, Dong,Wang, Haiquan,Luo,Min,Lv, Weifeng,Characterization and Modeling inLarge-scale Urban DTNs,37th Annual IEEE Conference on LocalComputer Networks (LCN),352-359,Clearwater, FL,2012.10.22-2012.10.25.
12. YaoShan,Xia Chunhe,Hu Junshun,Jiao Jian,LiXiaojian,Semantics-Based Compliance Analysis of Network Security Policy Hierarchies,ChinaCommunications,2012,9(07):22-35.
|