The SCEAS System
Navigation Menu

Search the dblp DataBase


Chenxi Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ahren Studer, Chenxi Wang
    Adaptive Detection of Local Scanners. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:1-17 [Conf]
  2. Chenxi Wang, John C. Knight, Matthew C. Elder
    On Computer Viral Infection and the Effect of Immunization. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:246-256 [Conf]
  3. Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Stan Bielski, Gregory R. Ganger
    Dynamic Quarantine of Internet Worms. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:73-82 [Conf]
  4. Chenxi Wang, Jonathan Hill, John C. Knight, Jack W. Davidson
    Protection of Software-Based Survivability Mechanisms. [Citation Graph (0, 0)][DBLP]
    DSN, 2001, pp:193-202 [Conf]
  5. Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew Wright
    Timing Attacks in Low-Latency Mix Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:251-265 [Conf]
  6. Ginger Perng, Michael K. Reiter, Chenxi Wang
    M2: Multicasting Mixes for Efficient and Anonymous Communication. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:59- [Conf]
  7. Ginger Perng, Michael K. Reiter, Chenxi Wang
    Censorship Resistance Revisited. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:62-76 [Conf]
  8. Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi Wang
    Empirical Analysis of Rate Limiting Mechanisms. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:22-42 [Conf]
  9. Theodore M. Wong, Chenxi Wang, Jeannette M. Wing
    Verifiable Secret Redistribution for Archive System. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:94-106 [Conf]
  10. Michael K. Reiter, Asad Samar, Chenxi Wang
    The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. [Citation Graph (0, 0)][DBLP]
    SRDS, 2003, pp:339-348 [Conf]
  11. Michael K. Reiter, Asad Samar, Chenxi Wang
    Distributed Construction of a Fault-Tolerant Network from a Tree. [Citation Graph (0, 0)][DBLP]
    SRDS, 2005, pp:155-165 [Conf]
  12. Yang Wang, Deepayan Chakrabarti, Chenxi Wang, Christos Faloutsos
    Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint. [Citation Graph (0, 0)][DBLP]
    SRDS, 2003, pp:25-34 [Conf]
  13. Chenxi Wang, William A. Wulf
    Towards a Scalable PKI for Electronic Commerce Systems. [Citation Graph (0, 0)][DBLP]
    WECWIS, 1999, pp:132-136 [Conf]
  14. Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang
    A study of mass-mailing worms. [Citation Graph (0, 0)][DBLP]
    WORM, 2004, pp:1-10 [Conf]
  15. Philip Koopman, Howie Choset, Rajeev Gandhi, Bruce H. Krogh, Diana Marculescu, Priya Narasimhan, JoAnn M. Paul, Ragunathan Rajkumar, Daniel P. Siewiorek, Asim Smailagic, Peter Steenkiste, Donald E. Thomas, Chenxi Wang
    Undergraduate embedded system education at Carnegie Mellon. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2005, v:4, n:3, pp:500-528 [Journal]
  16. Matthew Dunlop, Carrie Gates, Cynthia Wong, Chenxi Wang
    SWorD - A Simple Worm Detection Scheme. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1752-1769 [Conf]
  17. Steve J. Chapin, Chenxi Wang, William A. Wulf, Frederick Knabe, Andrew S. Grimshaw
    A new model of security for metasystems. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 1999, v:15, n:5-6, pp:713-722 [Journal]

  18. A Target Recognition Method of Multi-radar. [Citation Graph (, )][DBLP]

  19. Self-optimizing distributed trees. [Citation Graph (, )][DBLP]

  20. Modeling the effects of timing parameters on virus propagation. [Citation Graph (, )][DBLP]

Search in 0.021secs, Finished in 0.022secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002