Search the dblp DataBase
Pau-Chen Cheng :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ran Canetti , Pau-Chen Cheng , Frederique Giraud , Dimitrios E. Pendarakis , Josyula R. Rao , Pankaj Rohatgi , Debanjan Saha An IPSec-based Host Architecture for Secure Internet Multicast. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Suresh Chari , Pau-Chen Cheng BlueBox: A Policy-Driven, Host-Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] NDSS, 2002, pp:- [Conf ] Pau-Chen Cheng , Juan A. Garay , Amir Herzberg , Hugo Krawczyk Securing the Internet (Abstract). [Citation Graph (0, 0)][DBLP ] PODC, 1995, pp:257- [Conf ] Pau-Chen Cheng , Pankaj Rohatgi , Claudia Keser , Paul A. Karger , Grant M. Wagner , Angela Schuett Reninger Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:222-230 [Conf ] Pau-Chen Cheng An architecture for the Internet Key Exchange Protocol. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 2001, v:40, n:3, pp:721-746 [Journal ] Pau-Chen Cheng , Juan A. Garay , Amir Herzberg , Hugo Krawczyk A Security Architecture for the Internet Protocol. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1998, v:37, n:1, pp:42-60 [Journal ] Suresh Chari , Pau-Chen Cheng BlueBoX: A policy-driven, host-based intrusion detection system. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:173-200 [Journal ] Kang-Won Lee , Suresh Chari , Anees Shaikh , Sambit Sahu , Pau-Chen Cheng Improving the resilience of content distribution networks to large scale distributed denial of service attacks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2753-2770 [Journal ] MLS security policy evolution with genetic programming. [Citation Graph (, )][DBLP ] Policy Evolution with Grammatical Evolution. [Citation Graph (, )][DBLP ] Learning based access control in online social networks. [Citation Graph (, )][DBLP ] Policy evolution with Genetic Programming: A comparison of three approaches. [Citation Graph (, )][DBLP ] Risk profiles and distributed risk assessment. [Citation Graph (, )][DBLP ] Search in 0.082secs, Finished in 0.083secs