Year |
Citation |
Score |
2019 |
Hu D, Feng D, Xie Y, Xu G, Gu X, Long D. Efficient Provenance Management via Clustering and Hybrid Storage in Big Data Environments Ieee Transactions On Big Data. DOI: 10.1109/Tbdata.2019.2907116 |
0.648 |
|
2018 |
Xie Y, Feng D, Hu Y, Li Y, Sample S, Long D. Pagoda: A Hybrid Approach to Enable Efficient Real-time Provenance Based Intrusion Detection in Big Data Environments Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2018.2867595 |
0.652 |
|
2018 |
Xie Y, Feng D, Liao X, Qin L. Efficient monitoring and forensic analysis via accurate network-attached provenance collection with minimal storage overhead Digital Investigation. 26: 19-28. DOI: 10.1016/J.Diin.2018.05.001 |
0.591 |
|
2016 |
Xie Y, Feng D, Tan Z, Zhou J. Unifying intrusion detection and forensic analysis via provenance awareness Future Generation Computer Systems. 61: 26-36. DOI: 10.1016/J.Future.2016.02.005 |
0.599 |
|
2016 |
Xie Y, Feng D, Li Y, Long DDE. Oasis: An active storage framework for object storage platform Future Generation Computer Systems. 56: 746-758. DOI: 10.1016/J.Future.2015.08.011 |
0.611 |
|
2013 |
Xie Y, Muniswamy-Reddy K, Feng D, Li Y, Long DDE. Evaluation of a Hybrid Approach for Efficient Provenance Storage Acm Transactions On Storage. 9: 14. DOI: 10.1145/2501986 |
0.601 |
|
2013 |
Xie Y, Feng D, Tan Z, Zhou J. Design and Evaluation of a Provenance-Based Rebuild Framework Ieee Transactions On Magnetics. 49: 2805-2811. DOI: 10.1109/Tmag.2013.2251460 |
0.591 |
|
2006 |
Feng D, Jin H. Massive Storage Systems Journal of Computer Science and Technology. 21: 648-664. DOI: 10.1007/S11390-006-0648-X |
0.403 |
|
1997 |
Feng D, Zhu Z, Jin H, Zhang J. Fast disk array for image storage Electronic Imaging. 3021: 277-283. DOI: 10.1117/12.263519 |
0.334 |
|
1996 |
Jin H, Feng D, Zhang J. Online performance evaluation of disk-shadowing subsystem Proceedings of Spie. 2759: 570-576. DOI: 10.1117/12.241175 |
0.3 |
|
Show low-probability matches. |