[1] 周余阳,程光,赵玉宇,陈子涵,蒋山青. Toward Proactive and Efficient DDoS Mitigation in IIoT Systems A Moving Target Defense Approach. IEEE Transactions on Industrial Informatics. 18(4): 2734-2744.. 2022-04. [2] 周余阳,程光,余水. An SDN-enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks. IEEE Transactions on Information Forensics and Security. 16:5366-5380.. 2021-11. [3] 程光,钱德鑫,郭建伟,史海滨,吴桦,赵玉宇. A Classification Approach Based on Divergence for Network Traffic in Presence of Concept Drift. 计算机研究与发展. 58卷.. 2021-01. [4] 周余阳,程光,蒋山青,赵玉宇,陈子涵. Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes. Computers & Security. 97:101976.. 2020-10. [5] 周余阳,程光,蒋山青,戴冕. Building an efficient intrusion detection system based on feature selection and ensemble classifier. Computer Networks. 174:107247.. 2020-06. [6] 周余阳,程光,蒋山青,胡莹,赵玉宇,陈子涵. A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense. Proceedings of the 6th ACM Workshop on Moving Target Defense. 57-66.. 2019-11. [7] 程光,赵丽侠,胡晓艳,郑少琦,吴桦. Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-wide View. 2019 IEEE First International Workshop on Network Meets Intelligent Computations (NMIC).. 2019-07. [8] 缪海飞,程光. Real-time DDoS Attack Detection Method for Programmable Device. IEEE International Conference on Information and Automation.. 2019-06. [9] 房敏,程光. Research on Video Initial Buffer Size in Mobile Network. 首届互联网体系结构学术会议. 1-8.. 2018-12. [10] 周余阳,程光,郭春生,戴冕. Survey on attack surface dynamic transfer technology based on moving target defense. 软件学报. 29(9):2799-2820.. 2018-09. [11] 周余阳,程光,郭春生. Risk assessment method for network attack surface based on Bayesian attack graph. 网络与信息安全学报. 4(6):11-22.. 2018-06. [12] 郭春生,程光. An approach to decrypting ransomware WannaCry based on API hooking. 网络空间安全. 2018,01:8-14.. 2018-01. [13] 朱琛刚,程光. Big Data Analytics for Program Popularity Prediction in Broadcast TV Industries. IEEE Access. v5, p24593 - 24601.. 2017-10. EI: 20174504371228, SCI:WOS: 000417742800051 [14] 朱琛刚,程光. Program Popularity Prediction Model of Internet TV Based on Viewing Behavior. Journal of Electronics and Information Technology. v39, n10, p2504-2512.. 2017-10. EI: 20174804460163 [15] 戴震,程光. Advanced persistent threat detection based on characteristics of communications. 计算机工程与应用.. 2017-10. [16] 潘吴斌,程光,Yongning Tang. WENC: HTTPS encrypted traffic classification using weighted ensemble learning and Markov chain. TrustCom 2017 : The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. p50-57.. 2017-09. EI: 20174404328464 [17] 朱琛刚,程光. Program Popularity Prediction Model of Internet TV Based on Viewing Behavior. 3rd International Conference, INISCOM 2017. P.142-154.. 2017-09. [18] 程光,Yongning Tang. EOpenFlow: Software defined sampling via a highly adoptable OpenFlow extension. 2017 IEEE International Conference on Communications, ICC 2017.. 2017-07. EI: 20173504100074 [19] 程光,陈玉祥. Identification method of encrypted traffic based on support vector machine. Journal of Southeast University (Natural Science Edition). v47, n4, p655-659.. 2017-07. EI: 20173504083868 [20] 潘吴斌,程光,郭晓军. An Adaptive Classification Approach Based on Information Entropy for Network Traffic in Presence of Concept Drift. Chinese Journal of Computers. v40, n7, p1556-1571.. 2017-07. EI: 20174304296418 [21] 程光. Adaptive sampling for openflow network measurement methods. The 12th International Conference on Future Internet Technologies, CFI 2017. Part F128772.. 2017-06. EI: 20173003992372 [22] 郭晓军,程光,胡一非,戴冕. C&C Information Sharing Scheme in Local Network Based on LLMNR Protocol and Evidential Theory. Journal of Electronics and Information Technology. v39, n3, p525-531.. 2017-03. EI: 20171903645853, SCI:WOS: 000415726700003 [23] 张庭秀,程光. Detecting Domain-Flux Botnet Based On Dns Traffic Features In Managed Network. Security and Communication Networks. v 9, n 14, p 2338-2347.. 2016-09. EI: 20162202447384, SCI:WOS: 000383448500008 [24] 潘吴斌,程光,郭晓军,黄顺翔. 网络加密流量识别研究综述及展望. 通信学报. 第37卷第9期.. 2016-09. [25] 郭晓军,程光,胡一非,戴冕. Progress in command and control server finding schemes of Botnet. TrustCom 2016 : The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. p1723-1727.. 2016-08. EI: 20171103451990 [26] 潘吴斌,程光,吴桦,Yongning Tang. Towards QoE Assessment of Encrypted YouTube Adaptive Video Streaming in Mobile Networks. IWQOS 2016.. 2016-06. EI: 20170403267749 [27] 朱琛刚,程光,郭晓军,王玉祥. RBAS:A Real-Time User Behavior Analysis System for Internet TV in Cloud Computing. ACM, CFI 2016 - The 11th International Conference on Future Internet Technologies.. 2016-06. [28] 张庭秀,程光. Detecting DGA-Based Botnet With DNS Traffic Analysis In Monitored Network. Journal of Internet Technology.. 2016-06. SCI [29] 陈玉祥,程光. 基于流的加密流量识别方法. 2016东南大学计算机科学与工程学院学术论坛.. 2016-05. [30] 周爱平,程光,郭晓军,张庭秀,朱琛刚. Heavy hitter identification based on adaptive sampling with MapReduce. The International Journal of Computer Systems Science and Engineering (IJCSSE).. 2016-04. SCI [31] 张庭秀,程光,Ahmad Jakalan,郭晓军,周爱平. Detecting C&C Server of Botnet with DNS Traffic Analysis in Monitored Network. Journal of Internet Technology.. 2016-04. EI, SCI [32] 梁一鑫,程光,郭晓军,周爱平. 机载网络体系结构及其协议栈研究进展. 软件学报.. 2016-04. EI [33] 朱琛刚,程光,胡一非,王玉祥. A Caching Strategy for Internet Plus TV Based on Popularity Prediction. 计算机研究与发展. Vol.53 No.4 P.742-751.. 2016-04. [34] Yongning Tang,程光,Zhiwei Xu. Service Oriented Verification Integrated Fault Reasoning for SDNs. The 30-th IEEE International Conference on Advanced Information Networking and Applications (AINA-2016).. 2016-03. [35] 张庭秀,程光. Detecting Bot-Infected Machines Based On Analyzing The Similar Periodic DNS Queries In Network Traffic. ComManTel 2015.. 2015-12. EI [36] 郭晓军,程光,潘吴斌,张庭秀,梁一鑫. A Novel Search Engine-Based Method for Discovering Command and Control Server. ICA3PP 2015.. 2015-11. EI: 20160101746875 [37] 程光,王玉祥,胡一非,郭晓军. 基于OpenFlow的链路故障诊断方法. 北京邮电大学学报. Vol. 38 No. 5 p:42-46.. 2015-10. EI: 20155301741615 [38] 王艳,程光,潘吴斌,郭晓军. 一种增量式的加权集成学习流分类方法. 2015东南大学校庆研究生学术报告会.. 2015-04. [39] 相增辉,程光. 水域模拟三维可视化技术研究. 2015计算机科学与工程学院学术论坛.. 2015-04. [40] 程志,程光,郭晓军. 基于DPI与DFI的HTTP流归并算法. 2015计算机科学与工程学院学术论坛.. 2015-04. [41] 郭晓军,程光,周爱平,潘吴斌,朱琛刚. 基于扩频Manchester码的可靠自同步网络隐蔽时间通信模型. 东南大学学报. 第45卷第1期, p23-30.. 2015-01. EI: 20151000594369 [42] 张庭秀,程光. A bot identification method based on Domain-Flux traffic features. CSIT2014.. 2014-11. [43] 张庭秀,程光,郭晓军,潘吴斌. Webshell detection techniques in web applications. ICCCNT 2014.. 2014-11. EI: 20145000320170 [44] 张军,程光. 基于流的僵尸网络检测框架. 第16届海峡两岸信息技术研讨会.. 2014-11. [45] 潘吴斌,程光. 基于选择性集成策略的嵌入式网络流特征选择. 计算机学报. Vol.37 No.10.. 2014-10. EI: 201444135684 [46] 张庭秀,程光,郭晓军,潘吴斌. Evil-hunter: a novel web shell detection system based on scoring scheme. Journal of Southeast University. vol.30(3), pages: 278-284.. 2014-09. EI: 201446181325 [47] 郭晓军,程光. 主动网络流水印技术研究进展. 通信学报. 2014,(7):178~192.. 2014-07. EI: 201436062319 [48] 张杰,程光. 基于被动测量的流媒体业务性能分析. 2014计算机科学与工程学院学术论坛.. 2014-04. [49] 张彪,程光. 洪水淹没模拟三维可视化技术研究. 2014计算机科学与工程学院学术论坛.. 2014-04. [50] 马永,程光. 基于hadoop的网络测量方法研究. 2014计算机科学与工程学院学术论坛.. 2014-04. [51] 王会羽,程光. 基于主动方式的恶意代码捕获系统. 2014计算机科学与工程学院学术论坛.. 2014-04. [52] 郭晓军,程光. Make Your Webpage Carry Abundant Secret Informatin Unawarely. 15th IEEE International Conference on High Performance Computing and Communications.. 2013-11. [53] 周爱平,程光,郭晓军. 高速网络流量测量方法. 软件学报.. 2013-11. EI: 20140817350449 [54] 程光,Yongning Tang. 基于近似方法的抽样报文流数估计算法. 软件学报. 2013, 24(2)):255-265... 2013-10. EI: 20131016090318 [55] 程光,Yongning Tang. PortView: identifying port roles based on port fuzzy macroscopic behavior. Journal of Internet Services and Applications. 2013, 4(1): 1-12... 2013-10. EI: 20141517555056 [56] Yongning Tang,程光. Catching modern botnets using active integrated evidential reasoning. Journal of Internet Services and Applications. v 4, n 1, p 1-10, 2013.. 2013-09. EI: 20141517555062 [57] 程光,Yongning Tang. Line speed accurate superspreader identification using dynamic error compensation. Computer Communications. Volume 36, Issue 13.. 2013-07. EI: 20133516660355, SCI:WOS: 000324226500007 [58] 李翔,程光. 活跃节点检测算法的分析与研究. 2013年东南大学校庆报告会.. 2013-05. [59] 赵昕,程光. 用于单点检测子网连通性的优化方法. 2013年东南大学校庆报告会.. 2013-05. [60] 张阳,程光. 基于流量特性的僵尸网络检测方法研究. 2013年东南大学校庆报告会.. 2013-05. [61] 卢海阳,程光. 基于抽样与实时监控的完整性快速检测. 2013年东南大学校庆报告会.. 2013-05. [62] 周爱平,程光. 基于峰值流量的网络行为特征及影响因子分析. 通信学报. 33(10): 117-125.. 2012-10. EI: 20124815724199 [63] 周爱平,程光. 博弈论在异构的多接入网络选择策略应用. 中国科技论文在线. 7(7): 506-513.. 2012-07. [64] Yongning Tang,程光. Probabilistic and reactive fault diagnosis for dynamic overlay networks. PEER-TO-PEER NETWORKING AND APPLICATIONS. Vol.4,No.4,p439-452.. 2011-12. EI: 20113414252527, SCI: 808LL [65] 吴昊,程光. HTTP网络应用特征串的自动提取. 广西大学学报. Vol.36,No.1,p61-64.. 2011-11. [66] 刘军,程光. 异常检测中信息熵灵敏度分析. 广西大学学报. Vol.36,No.1,p161-164.. 2011-11. [67] 张涛,程光. 基于社区的覆盖网监测与故障推理系统. 2011年东南大学校庆报告会.. 2011-10. [68] 高中耀,程光. 基于被动测量的TCP报文丢包定位方法研究. 2011江苏省计算机学会网络与分布计算、网格与服务计算专委会联合学术年会.. 2011-10. [69] 高中耀,程光. 基于被动测量的TCP报文乱序研究. 2011年东南大学校庆报告会.. 2011-10. [70] 程光. Traffic classification based on port connection pattern. CSSS2011.. 2011-06. EI: 20113614303722 [71] 程光. Real-time inferring network traffic patterns. CCNC2011.. 2011-01. [72] 王松,程光. 基于连接模式和并发连接数的流量识别. 中南大学学报. Vol.41,No.增1,p226-230.. 2010-10. [73] 江洁欣,程光. 一种资源节约的快速一维网络流量聚合方法. 全国计算机技术应用与高等学校计算机教育论文集第一卷. Vol.1 No.1 P:332-336.. 2009-11. [74] 史海涛,程光. 基于隶属度的自治系统级拓扑发现. 全国计算机技术应用与高等学校计算机教育论文集第一卷. Vol.1 No.1 P:218-221.. 2009-11. [75] 程光,Yongning Tang,江洁欣. A trace measurement and analysis for the multilinks CERNET Backbone. IEEE. Vol.1 No.0 P:341-346.. 2009-07. [76] Yongning Tang,程光,Zhiwei Xu,Ehab AI Shaer. Community-base Fault Diagnosis Using Incremental Belief Revision. IEEE. Vol.1 No.0 P:121-128.. 2009-07. EI: 20094712474379 [77] 程光,强士卿. Super point detection based on sampling and data streaming algorithms. 东南大学学报(英文版). Vol.25 No.2 P:224-227.. 2009-01. EI: 20093212240958 [78] 程光,龚俭. A Detecting Superpoint Algorithm on Multiple Sampling Technology. FGCN 2008.. 2008-12. EI: 20091211972381 [79] 程光,龚俭. XOR Hashing Algorithms to Measured Flows at the High-Speed Link. FGCN 2008.. 2008-12. EI: 20091211972392 [80] 程光,龚俭. Adaptive Aggregation Flow Measurement on high speed Links. IEEE ICCS 2008.. 2008-11. EI: 20091411995947 [81] 程光,龚俭. A Method to Device Flow Hash Algorithm Based Traffic Character. ICCT.. 2008-11. EI: 20090511880799 [82] 程光,龚俭. Online Identifying Elephant Flows through a Scalable Non-uniform Sampling Algorithm. ICCT.. 2008-11. EI: 20090511880920 [83] 程光,龚俭. A New Method for Detection of Super Point. CIICT 2008.. 2008-09. EI: 20092912188625 [84] 程光,龚俭,丁伟,吴桦,强士卿. 基于自适应抽样的超点检测算法. 中国科学E辑. Vol.38 No.10 P:1679-1696.. 2008-09. SCI: 361IT [85] 强士卿,程光. 基于流的哈希函数比较分析研究. 南京师范大学学报(工程技术版). 2008年第4期.. 2008-09. [86] 程光,强士卿. 一个检测超流的早期淘汰算法. 厦门大学学报(自然科学版). Vol.46 No.2 P:202-204.. 2007-11. [87] 程光,龚俭. A Hash Function for IP Flow Selection in High-Speed Network. Complex Systems and Applications-Modeling. Vol.14 No.2 P:1494-1498.. 2007-07. [88] 程光,龚俭. A resource-efficient flow monitoring system. IEEE-CommunicationLetter. Vol.11 No.6 P:558-560.. 2007-06. EI: 20073410779809, SCI:IDS Number: 178LX [89] 程光,丁伟. A Double-sampling and Hold Based Approach for Accurate and Efficient Network Flow Monitoring. ICCS 2007.. 2007-05. EI: 20080411044894 [90] 程光,龚俭. A Hybrid Sampling Approach for Network Flow Monitoring. IEEE MON2007.. 2007-05. EI: 9622334 [91] 程光,龚俭,丁伟. A Time-Series Decomposed Model of Network Traffic. LNCS. LNCS 3611Vol.3611 No.1 P:333-340.. 2005-06. EI: 05439427204, SCI/ISTP:IDS Number: BDA23, ISTP:IDS Number: BDA23 [92] 程光,龚俭,丁伟,徐加羚. 面向IP流的哈希算法研究. 软件学报. Vol.16 No.5 P:652-658.. 2005-05. EI: 2005279197435 [93] 程光,龚俭,丁伟. network traffic sampling model on packet identification. LNCS. Vol.3420 No.1 P:758-765.. 2005-04. EI: 2005389367347, SCI&ISTP: IDS BCF66, ISTP: IDS BCF66 [94] 程光,龚俭,丁伟. 基于小波的网络流量分解模型. 小型微型计算机系统.. 2005-01. EI: 8550464 [95] 程光,丁伟,龚俭. 基于高速IP网络测量平台研究. CSIT. Vol.1 No.1 P:122-129.. 2004-11. [96] 程光,丁伟,徐加羚. 网络主机时钟相对漂移模型研究. 计算机工程与应用. Vol.40 No.28 P:1-4.. 2004-09. [97] 程光,龚俭,丁伟. 网络测量及行为学研究综述. 计算机工程与应用. Vol.40 No.27 P:1-8.. 2004-09. [98] 程光,龚俭,丁伟. Network Traffic Sampling Model on Packet Identification. APAN 18th. Vol.1 No.1 P:133-140.. 2004-07. [99] 程光,龚俭,丁伟. A Time-series Decomposed Model of Network Traffic. APAN 18th. Vol.1 No.1 P:35-40.. 2004-07. [100] 程光,龚俭,丁伟. Nonlinear-Periodical Network Traffic Behavioral Forecast on Seasonal Neural Network Model1. ICCCAS2004. Vol.1 No.1 P:683-687.. 2004-06. EI: 2005038790108 [101] 程光,龚俭,丁伟. A Relative Time Model in a Distributed Network using Exchanged Time Information. CCNC2004. Vol.1 No.1 P:382-387.. 2004-01. EI: 2004288256767, ISTP:IDS Number: BAD16 [102] 林容容,程光,丁伟. 基于NTP协议的时钟同步系统. 海峡两岸青年学术交流会议论文集. 无Vol.5 No.5 P:288-294.. 2003-11. [103] 程光,龚俭,丁伟. 基于统计分析的高速网络分布式抽样测量模型. 计算机学报. Vol.26 No.10 P:1266-1273.. 2003-10. EI: 2004068009273 [104] 程光,龚俭. 大规模网络流量宏观行为周期性分析研究. 小型微型计算机系统. Vol.24 No.6 P:991-994.. 2003-06. EI: 2003307568973 [105] 葛立青,程光,龚俭. 优化端至端SLA的代价分析. 计算机工程与应用. Vol.39 No.6 P:145-147.. 2003-06. [106] 程光,龚俭,丁伟. 大规模互联网活动IP流分布研究. 计算机科学. Vol.30 No.4 P:43-46.. 2003-04. [107] 程光,龚俭,丁伟. 基于抽样测量的高速网络实时异常检测模型. 软件学报. Vol.14 No.3 P:594-599.. 2003-03. [108] 程光,龚俭,丁伟. 基于分组标识的网络流量抽样测量模型. 电子学报. Vol.30, No.12AVol. No. P:89-93.. 2002-12. EI: 03247506872 [109] 程光,龚俭. CERNET流量行为季节预测模型. 小型微型计算机系统. Vol.23 No.11 P:1321-1324.. 2002-11. EI: 03047337191 [110] 程光,龚俭,丁伟. 大规模网络流量宏观行为时序分解模型. 电子学报. Vol.30 No.11 P:-.. 2002-11. EI: 2003137420506 [111] 赵钧,程光,丁伟. 大规模网络流量分组标识方法的分析研究. 东南大学学报第32卷(增刊). Vol.32 No. P:129-.. 2002-11. [112] 程光,龚俭,丁伟. 大规模网络流量行为累加分解研究. 计算机工程与科学. CN43-1258/TPVol.24 No.5 P:53-.. 2002-10. [113] 程光,龚俭,丁伟. A Traffic Sampling Model for Measurement Using Packet Identification. ICON2002. Vol. No. P:409-413.. 2002-08. [114] 程光,龚俭. 大规模高速网络流量测量研究. 计算机工程与应用. Vol.38 No.5 P:17-19.. 2002-03. [115] 龚俭,程光. Distributed Sampling Measurement Model in a Large-Scale High-Speed IP Networks. Journal of Southeast University. Vol.18 No.1 P:40-.. 2002-03. [116] 程光,龚俭. Traffic Behavior Analysis with Poisson Sampling on High-speed Network. 信息技术与信息网络国际会议.. 2001-10. ISTP:IDS Number: BU94X [117] 程光,龚俭. 大规模互联网流量测量研究. 第7届全国青年通信学术会议.. 2001-09. [118] 程光,龚俭. 图算系统开发工具-ObjectArx. 中国图算学会第7次学术会议.. 2000-10. [119] 程光,龚俭. 图尺函数的编译分析. 中国图算学会第7次学术会议.. 2000-10.