The SCEAS System
Navigation Menu

Search the dblp DataBase


Pau-Chen Cheng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha
    An IPSec-based Host Architecture for Secure Internet Multicast. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  2. Suresh Chari, Pau-Chen Cheng
    BlueBox: A Policy-Driven, Host-Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  3. Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk
    Securing the Internet (Abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 1995, pp:257- [Conf]
  4. Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger
    Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:222-230 [Conf]
  5. Pau-Chen Cheng
    An architecture for the Internet Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 2001, v:40, n:3, pp:721-746 [Journal]
  6. Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk
    A Security Architecture for the Internet Protocol. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1998, v:37, n:1, pp:42-60 [Journal]
  7. Suresh Chari, Pau-Chen Cheng
    BlueBoX: A policy-driven, host-based intrusion detection system. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:173-200 [Journal]
  8. Kang-Won Lee, Suresh Chari, Anees Shaikh, Sambit Sahu, Pau-Chen Cheng
    Improving the resilience of content distribution networks to large scale distributed denial of service attacks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2753-2770 [Journal]

  9. MLS security policy evolution with genetic programming. [Citation Graph (, )][DBLP]

  10. Policy Evolution with Grammatical Evolution. [Citation Graph (, )][DBLP]

  11. Learning based access control in online social networks. [Citation Graph (, )][DBLP]

  12. Policy evolution with Genetic Programming: A comparison of three approaches. [Citation Graph (, )][DBLP]

  13. Risk profiles and distributed risk assessment. [Citation Graph (, )][DBLP]

Search in 0.001secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002