The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Steven Cheung: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Steven Cheung, Bruno Dutertre, Ulf Lindqvist
    Detecting Disruptive Routers in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2006, pp:19-31 [Conf]
  2. Tomás E. Uribe, Steven Cheung
    Automatic analysis of firewall and network intrusion detection system configurations. [Citation Graph (0, 0)][DBLP]
    FMSE, 2004, pp:66-74 [Conf]
  3. Steven Cheung, Ulf Lindqvist, Martin W. Fong
    Modeling Multistep Cyber Attacks for Scenario Recognition. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:284-292 [Conf]
  4. Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe
    Dependable Intrusion Tolerance: Technology Demo. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:128-130 [Conf]
  5. Steven Cheung, Karl N. Levitt
    A Formal-Specification Based Approach for Protecting the Domain Name System. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:641-0 [Conf]
  6. Steven Cheung
    Avoiding Pitfalls of Entity Identifiers. [Citation Graph (0, 0)][DBLP]
    High-Performance Web Databases, 2001, pp:277-303 [Conf]
  7. Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe
    An Architecture for an Adaptive Intrusion-Tolerant Server. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:158-178 [Conf]
  8. Steven Cheung
    Denial of Service against the Domain Name System. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:40-45 [Journal]
  9. Steven Cheung, Francis C. M. Lau
    Mesh Permutation Routing with Locality. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1992, v:43, n:2, pp:101-105 [Journal]
  10. Steven Cheung, Francis C. M. Lau
    A Lower Bound for Permutation Routing on Two-Dimensional Bused Meshes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1993, v:45, n:5, pp:225-228 [Journal]
  11. Steven Cheung, Francis C. M. Lau
    Routing with Locality on Meshes with Buses. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1996, v:33, n:1, pp:84-90 [Journal]
  12. Steven Cheung, Francis C. M. Lau
    Time Lower Bounds for Permutation Routing on Multi-Dimensional Bused Meshes. [Citation Graph (0, 0)][DBLP]
    Parallel Processing Letters, 1993, v:3, n:, pp:129-138 [Journal]

  13. Intrusion Monitoring in Process Control Systems. [Citation Graph (, )][DBLP]


  14. Detecting Disruptive Routers: A Distributed Network Monitoring Approach. [Citation Graph (, )][DBLP]


  15. Securing Current and Future Process Control Systems. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002