|
Search the dblp DataBase
Shyhtsun Felix Wu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jedidiah R. Crandall, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong
Temporal search: detecting hidden malware timebombs with virtual machines. [Citation Graph (0, 0)][DBLP] ASPLOS, 2006, pp:25-36 [Conf]
- Daniela A. S. de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong
ExecRecorder: VM-based full-system replay for attack analysis and system recovery. [Citation Graph (0, 0)][DBLP] ASID, 2006, pp:66-71 [Conf]
- Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:235-248 [Conf]
- Gregory L. Wittel, Shyhtsun Felix Wu
On Attacking Statistical Spam Filters. [Citation Graph (0, 0)][DBLP] CEAS, 2004, pp:- [Conf]
- Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong
Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:32-50 [Conf]
- Seung-Sun Hong, Fiona Wong, Shyhtsun Felix Wu, Bjorn Lilja, Tony Y. Yohansson, Henric Johnson, Ame Nelsson
TCPtransform: Property-Oriented TCP Traffic Transformation. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:222-240 [Conf]
- Xiaoliang Zhao, Daniel Massey, Shyhtsun Felix Wu, Mohit Lad, Dan Pei, Lan Wang, Lixia Zhang
Understanding BGP Behavior through a Study of DoD Prefixes. [Citation Graph (0, 0)][DBLP] DISCEX (1), 2003, pp:214-225 [Conf]
- Dan Pei, Lan Wang, Daniel Massey, Shyhtsun Felix Wu, Lixia Zhang
A Study of Packet Delivery Performance during Routing Convergence. [Citation Graph (0, 0)][DBLP] DSN, 2003, pp:183-192 [Conf]
- Xiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang
Detection of Invalid Routing Announcement in the Internet. [Citation Graph (0, 0)][DBLP] DSN, 2002, pp:59-68 [Conf]
- Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Daniel Massey, Xiaoliang Zhao, Dan Pei, Lan Wang, Lixia Zhang, Randy Bush
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events. [Citation Graph (0, 0)][DBLP] DSOM, 2003, pp:155-168 [Conf]
- Gail E. Kaiser, Steven S. Popovich, Wenwey Hseush, Shyhtsun Felix Wu
MELDing Multiple Granularities of Parallelism. [Citation Graph (0, 0)][DBLP] ECOOP, 1989, pp:147-166 [Conf]
- Shyhtsun Felix Wu
Sleepy Network-Layer Authentication Service for IPSEC. [Citation Graph (0, 0)][DBLP] ESORICS, 1996, pp:146-159 [Conf]
- Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. [Citation Graph (0, 0)][DBLP] ESORICS, 2002, pp:244-263 [Conf]
- Feiyi Wang, Shyhtsun Felix Wu
On the Vulnerabilities and Protection of OSPF Routing Protocol. [Citation Graph (0, 0)][DBLP] ICCCN, 1998, pp:148-152 [Conf]
- Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang
Protecting BGP Routes to Top Level DNS Servers. [Citation Graph (0, 0)][DBLP] ICDCS, 2003, pp:322-331 [Conf]
- Ke Zhang, Soon Tee Teoh, Shih-Ming Tseng, Rattapon Limprasittiporn, Kwan-Liu Ma, Shyhtsun Felix Wu, Chen-Nee Chuah
Performing BGP Experiments on a Semi-realistic Internet Testbed Environment. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2005, pp:130-136 [Conf]
- Souhwan Jung, Fan Zhao, Shyhtsun Felix Wu, HyunGon Kim
Threat Analysis on NEtwork MObility (NEMO). [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:331-342 [Conf]
- Henric Johnson, Lennart Isaksson, Markus Fiedler, Shyhtsun Felix Wu
A Decision System for Adequate Authentication. [Citation Graph (0, 0)][DBLP] ICN/ICONS/MCL, 2006, pp:185- [Conf]
- Henric Johnson, B. Qaisrani, Markus Fiedler, A. Nilsson, Shyhtsun Felix Wu
Hierarchical Defense Structure for Mitigating DoS Attacks. [Citation Graph (0, 0)][DBLP] ICN/ICONS/MCL, 2006, pp:83- [Conf]
- D. Qu, Brain Vetter, Feiyi Wang, R. Narayan, Shyhtsun Felix Wu, Y. Frank Jou, Fengmin Gong, C. Sargor
Statistical Anomaly Detection for Link-State Routing Protocols. [Citation Graph (0, 0)][DBLP] ICNP, 1998, pp:62-70 [Conf]
- Xiaobing Zhang, Shyhtsun Felix Wu, Zhi Fu, Tsung-Li Wu
Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It. [Citation Graph (0, 0)][DBLP] ICNP, 2000, pp:263-272 [Conf]
- Brain Vetter, Feiyi Wang, Shyhtsun Felix Wu
An experimental study of insider attacks for OSPF routing protocol. [Citation Graph (0, 0)][DBLP] ICNP, 1997, pp:293-300 [Conf]
- Yanyan Yang, Zhi (Judy) Fu, Shyhtsun Felix Wu
BANDS: An Inter-domain Internet Security Policy Management System for IPSec/VPN. [Citation Graph (0, 0)][DBLP] Integrated Network Management, 2003, pp:231-244 [Conf]
- Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang
Observation and analysis of BGP behavior under stress. [Citation Graph (0, 0)][DBLP] Internet Measurement Workshop, 2002, pp:183-195 [Conf]
- Xiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang
An analysis of BGP multiple origin AS (MOAS) conflicts. [Citation Graph (0, 0)][DBLP] Internet Measurement Workshop, 2001, pp:31-35 [Conf]
- Dan Pei, Xiaoliang Zhao, Lan Wang, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang
Improving BGP Convergence Through Consistency Assertions. [Citation Graph (0, 0)][DBLP] INFOCOM, 2002, pp:- [Conf]
- Ke Zhang, Amy Yen, Xiaoliang Zhao, Daniel Massey, Shyhtsun Felix Wu, Lixia Zhang
On Detection of Anomalous Routing Dynamics in BGP. [Citation Graph (0, 0)][DBLP] NETWORKING, 2004, pp:259-270 [Conf]
- Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fengmin Gong, Ilia Baldine, Chong Xu
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution. [Citation Graph (0, 0)][DBLP] POLICY, 2001, pp:39-56 [Conf]
- Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Yuh Huang
Intrusion Detection for an On-Going Attack. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
- Seung-Sun Hong, Shyhtsun Felix Wu
On Interactive Internet Traffic Replay. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:247-264 [Conf]
- He Huang, Shyhtsun Felix Wu
An approach to certificate path discovery in mobile Ad Hoc networks. [Citation Graph (0, 0)][DBLP] SASN, 2003, pp:41-52 [Conf]
- Wayne Huang, J. L. Cong, Chien-Long Wu, Fan Zhao, Shyhtsun Felix Wu
Design, Implementation, and Evaluation of "FRiTrace". [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:343-358 [Conf]
- Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:369-384 [Conf]
- Gail E. Kaiser, Wenwey Hseush, Steven S. Popovich, Shyhtsun Felix Wu
Multiple concurrency control policies in an object-oriented programming system. [Citation Graph (0, 0)][DBLP] SPDP, 1990, pp:623-626 [Conf]
- Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu
A Visual Exploration Process for the Analysis of Internet Routing Data. [Citation Graph (0, 0)][DBLP] IEEE Visualization, 2003, pp:523-530 [Conf]
- Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Xiaoliang Zhao
Case Study: Interactive Visualization for Internet Security. [Citation Graph (0, 0)][DBLP] IEEE Visualization, 2002, pp:- [Conf]
- Soon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, Shyhtsun Felix Wu
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP. [Citation Graph (0, 0)][DBLP] VizSEC, 2004, pp:35-44 [Conf]
- Jatin N. Hansoty, Mladen A. Vouk, Shyhtsun Felix Wu
LAVA: Secure Delegation of Mobile Applets: Design, Implementation, and Applications. [Citation Graph (0, 0)][DBLP] WETICE, 1997, pp:242-247 [Conf]
- Kihun Hong, Souhwan Jung, Shyhtsun Felix Wu
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:96-107 [Conf]
- Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu
Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal]
- Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, T. J. Jankun-Kelly
Detecting Flaws and Intruders with Visual Data Analysis. [Citation Graph (0, 0)][DBLP] IEEE Computer Graphics and Applications, 2004, v:24, n:5, pp:27-35 [Journal]
- Jim Yuill, Shyhtsun Felix Wu, J. Settle, Fengmin Gong, R. Forno, Ming-Yuh Huang, J. Asbery
Intrusion-detection for incident-response, using a military battlefield-intelligence process. [Citation Graph (0, 0)][DBLP] Computer Networks, 2000, v:34, n:4, pp:671-697 [Journal]
- Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shyhtsun Felix Wu
IPsec/VPN security policy correctness and assurance. [Citation Graph (0, 0)][DBLP] J. High Speed Networks, 2006, v:15, n:3, pp:275-289 [Journal]
- Steven S. Popovich, Gail E. Kaiser, Shyhtsun Felix Wu
MELDing transactions and objects. [Citation Graph (0, 0)][DBLP] OOPS Messenger, 1991, v:2, n:2, pp:94-98 [Journal]
- Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong
Minos: Architectural support for protecting control data. [Citation Graph (0, 0)][DBLP] TACO, 2006, v:3, n:4, pp:359-389 [Journal]
- Ho-Yen Chang, Shyhtsun Felix Wu, Y. Frank Jou
Real-time protocol analysis for detecting link-state routing protocol attacks. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:1, pp:1-36 [Journal]
- Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
CLID: A general approach to validate security policies in a dynamic network. [Citation Graph (0, 0)][DBLP] Integrated Network Management, 2007, pp:1-10 [Conf]
- F. Zhao, V. R. Vemuri, S. F. Wu, F. Xue, S. J. B. Yoo
Interactive Informatics on Internet Infrastructure. [Citation Graph (0, 0)][DBLP] Integrated Network Management, 2007, pp:90-99 [Conf]
- Shih-Ming Tseng, Ke Zhang, Shyhtsun Felix Wu, Kwan-Liu Ma, Soon Tee Teoh, Xiaoliang Zhao
Analysis of BGP Origin AS Changes Among Brazil-Related Autonomous Systems. [Citation Graph (0, 0)][DBLP] IPOM, 2007, pp:49-60 [Conf]
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System. [Citation Graph (, )][DBLP]
Crawling Online Social Graphs. [Citation Graph (, )][DBLP]
Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
An object-based approach to implementing distributed concurrency control. [Citation Graph (, )][DBLP]
iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. [Citation Graph (, )][DBLP]
Filter-Based RFD: Can We Stabilize Network Without Sacrificing Reachability Too Much? [Citation Graph (, )][DBLP]
Bounds on the Performance of P2P Networks Using Tit-for-Tat Strategies. [Citation Graph (, )][DBLP]
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. [Citation Graph (, )][DBLP]
Davis Social Links: Leveraging Social Networks for Future Internet Communication. [Citation Graph (, )][DBLP]
Design and Implementation of Davis Social Links OSN Kernel. [Citation Graph (, )][DBLP]
Lightweight Hardware Return Address and Stack Frame Tracking to Prevent Function Return Address Attack. [Citation Graph (, )][DBLP]
Trust Is in the Eye of the Beholder. [Citation Graph (, )][DBLP]
Noise Injection for Search Privacy Protection. [Citation Graph (, )][DBLP]
Davis Social Links or: How I Learned to Stop Worrying and Love the Net. [Citation Graph (, )][DBLP]
All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks. [Citation Graph (, )][DBLP]
Information Flow and Search in Unstructured Keyword Based Social Networks. [Citation Graph (, )][DBLP]
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers. [Citation Graph (, )][DBLP]
ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol. [Citation Graph (, )][DBLP]
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. [Citation Graph (, )][DBLP]
Panel three: Monitoring and controlling networks: Have we lost control of our networks? [Citation Graph (, )][DBLP]
On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies. [Citation Graph (, )][DBLP]
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. [Citation Graph (, )][DBLP]
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. [Citation Graph (, )][DBLP]
Inter-Profile Similarity (IPS): A Method for Semantic Analysis of Online Social Networks. [Citation Graph (, )][DBLP]
Social Network Model Based on Keyword Categorization. [Citation Graph (, )][DBLP]
Search in 0.008secs, Finished in 0.011secs
|