删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

山东大学计算机科学与技术学院研究生导师简介-王风宇

山东大学 免费考研网/2016-03-10


王风宇 副教授

email: wangfengyu@sdu.edu.cn
2007年~今,山东大学工作
2007年7月,中国科学院计算技术研究所毕业,获博士学位
招生意向
硕士研究生3名;
研究方向
网络安全与软件安全,主要包括
- 网络数据安全分析;
- 网络攻击检测;
- 二进制代码智能分析;

讲授课程
Linux应用;
操作系统概念;
操作系统课程设计;

承担项目
作为课题负责人先后承担了:
1. 国家自然科学基金,高速网络环境下Heavy Hitter的行为测量与分析,2008;
2. 国家博士后科研基金,基于行为分析的大规模网络攻击检测方法研究,2009;
3. 国家信息安全工程专项,XXXX二进制代码分析,2011;
4. 国家242信息安全计划,XXXX二进制代码复用,2012;
5. 国家信息安全工程专项,XXXX网络流量分类,2013;
6. 国家信息安全工程专项,二进制代码智能分析,2015;

发表论文
期刊:
1.Wang Jian, Wang Fengyu, Lin Fengbo, Wu Jiayan, Sink Location Privacy Protection under Direction Attack in Wireless Sensor Networks, Wireless Network, Accepted.
2.王风宇,曹首峰,肖军,云晓春,龚斌,一种基于Web群体外联行为的应用层DDoS检测方法, 软件学报,2013,24(6):1263?1273.
3.王风宇,郭山清,李亮雄,云晓春,一种高效率的大流提取方法,计算机研究与发展,2013, 50(4):731-740
4.Dai Hongjun, Xu Ronghua,Liu Yu, Wang Fengyu, A reliable load balance algorithm in one-dimentional linear WSNs, International Journal of Digital Content Technology and its Application, 2012, 6(19):223-229
5.张永铮,肖军,云晓春,王风宇,DDoS攻击检测和控制,软件学报,2012,23(8):2058-2072
6.Yan Haitao, Wang Fengyu, Cao Zhenzhong, Lin Fengbo, Chen Chuantong, A Novel Method to Defense Against Web DDoS,International Journal of Digital Content Technology and its Application,2012,6(19):162-170
7.胡毅,龚斌,王风宇.网格资源调度中基于云模型的蚁群算法,华中科技大学学报增刊,2009,38(SUPPL. 1), pp 64-67
8.王晓锋, 张宏莉,王风宇,张兆心. 网络模拟中的动态连续计算, 系统仿真学报. 2009,21(23):7439-7444
9.王风宇,云晓春,曹震中,多时间尺度同步的网络异常检测方法,通信学报,2007, 28(12): 60-65.
10.王风宇,云晓春,王晓峰,王勇,高速网络监控中大流量对象的提取,软件学报,2007, 18(12): 3060-3070.
11.王风宇,云晓春,申伟东,高速IP网络流量测量系统的设计与实现,高技术通讯,2006, 16(3): 232-236.
12.王风宇,云晓春,申伟东,基于小波变换的高速网络流量预测,高技术通讯,2006,16(12): 1220-1225.

会议:
1.Guo Shanqin, Wang Fengyu, Liang Bo, Identification of network applications with co-training, The 14th IEEE International Conference on Computational Science and Engineering, 2011:401-404
2.Liangxiong Li, Fengyu Wang, Tao Ban, Shanqing Guo, Bin Gong, Network flow classification based on the rhythm of packets , in Proceedings of 18th International Conference of Neural Information Processing, ICONIP 2011, 45-52
3.Chuantong Chen, Fengyu Wang, Fengbo Lin , Shanqing Guo, Bin Gong, Fast Protocol Recognition by Network Packet Inspection, in Proceedings of 18th International Conference of Neural Information Processing, ICONIP 2011, 37-44.
4.Shanqing Guo, Qixia Yuan, Fengbo Lin, Fengyu Wang, Tao Ban: A Malware Detection Algorithm Based on Multi-view Fusion. In:17th International Conference on Neural Information Processing of the Asia-PacificNeural Network Assembly( ICONIP2010) , 2010: 259-264
5.Fengyu Wang, Shanqing Guo, Yi Hu, Liangxiong Li, Bin Gong, REFI: Extracting Out Heavy-Hitter Flows Accurately and Rapidly, In Proceedings of The 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE 2010),2010.
6.Fengyu Wang, Bin Gong, Shanqing Guo, Xiaofeng Wang, Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently, In Proceedings of The 4’nd International Conference on Network and System Security (NSS 2010), 2010
7.Yi Hu,Bin Gong,Fengyu Wang.Cloud Model-Based Security-aware and Fault-Tolerant Job Scheduling for Computing Grid,The 5th ChinaGrid Annual Conference (ChinaGrid 2010),2010
8.Ningbo Zhang, Fengyu Wang, Bin Gong, Liangxiong Li. Identifying Heavy-hitter Flows Fast and Accurately, In Proceedings of The 2’nd International Conference on Future Computer and Communication (ICFCC 2010).
9.Fengyu Wang, Bin Gong, Yi Hu, Ningbo Zhang, Network Anomaly Dectection based on Traffic Prediction, In proceedings of ScalCom’09 , 2009.
10.Wang Feng-Yu, Yun Xiao-Chun, Wang Xiao-Feng, Wang Yong, Liu Jian-Xun. Identifying Large Flows in High-Speed Network with Two-Level Replacement, In Proceedings of International Conference on Communication Technology IASTED ICCT, 2006,200-205

专利:
1.一种应用层DDoS分布式拒绝服务攻击防御方法, 申请号/专利号: **5.6
2.基于Web通信群体外联行为的拒绝服务攻击检测方法,专利号:ZL**3.0
3.高速网络环境下多类型大流并行测量方法,发明专利,专利号:ZL**3.8
本人研究生从事的工作领域
互联网公司;移动通信;国家网络安全管理机构等
相关话题/计算机