The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Haining Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Cheng Jin, Haining Wang, Kang G. Shin
    Hop-count filtering: an effective defense against spoofed DDoS traffic. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:30-41 [Conf]
  2. Mengjun Xie, Heng Yin, Haining Wang
    An effective defense against email spam laundering. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:179-190 [Conf]
  3. Shansi Ren, Qun Li, Haining Wang, Xiaodong Zhang
    Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications. [Citation Graph (0, 0)][DBLP]
    DCOSS, 2005, pp:228-243 [Conf]
  4. Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia
    VoIP Intrusion Detection Through Interacting Protocol State Machines. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:393-402 [Conf]
  5. Xin Chen, Haining Wang, Shansi Ren
    DNScup: Strong Cache Consistency Protocol for DNS. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:40- [Conf]
  6. Haining Wang, Kang G. Shin
    Robust TCP Congestion Recovery. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:199-206 [Conf]
  7. Haining Wang, Danlu Zhang, Kang G. Shin
    SYN-dog: Sniffing SYN Flooding Sources. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:421-428 [Conf]
  8. Xin Chen, Shansi Ren, Haining Wang, Xiaodong Zhang
    SCOPE: scalable consistency maintenance in structured P2P systems. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1502-1513 [Conf]
  9. Indra Widjaja, Haining Wang, Steven Wright, Amalendu Chatterjee
    Scalability Evaluation of Multi-Protocol Over ATM (MPOA). [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1999, pp:1505-1512 [Conf]
  10. Haining Wang, Abhijit Bose, Mohamed A. El-Gendy, Kang G. Shin
    IP Easy-pass: Edge Resource Access Control. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  11. Haining Wang, Danlu Zhang, Kang G. Shin
    Detecting SYN Flooding Attacks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  12. Haining Wang, Kang G. Shin, Hongjie Xin, Douglas S. Reeves
    A Simple Refinement of Slow-Start of TCP Congestion Control. [Citation Graph (0, 0)][DBLP]
    ISCC, 2000, pp:98-105 [Conf]
  13. Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodong Zhang
    Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IWQoS, 2005, pp:107-122 [Conf]
  14. Mohamed A. El-Gendy, Abhijit Bose, Haining Wang, Kang G. Shin
    Statistical Characterization for Per-hop QoS. [Citation Graph (0, 0)][DBLP]
    IWQoS, 2003, pp:21-40 [Conf]
  15. Haining Wang, Carey L. Williamson
    A New Scheme for TCP Congestion Control: Smooth-Start and Dynamic Recovery. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1998, pp:69-76 [Conf]
  16. Mengjun Xie, Keywan Tabatabai, Haining Wang
    Identifying Low-ProfileWeb Server's IP Fingerprint. [Citation Graph (0, 0)][DBLP]
    QEST, 2006, pp:365-374 [Conf]
  17. Haining Wang, Kang G. Shin
    Layer-4 Service Differentiation and Resource Isolation. [Citation Graph (0, 0)][DBLP]
    IEEE Real Time Technology and Applications Symposium, 2002, pp:67-0 [Conf]
  18. Songqing Chen, Haining Wang, Xiaodong Zhang, Bo Shen, Susie Wee
    Segment-Based Proxy Caching for Internet Streaming Media Delivery. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2005, v:12, n:3, pp:59-67 [Journal]
  19. Haining Wang, Kang G. Shin
    Robust TCP congestion recovery. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2004, v:13, n:2, pp:103-121 [Journal]
  20. Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodong Zhang
    A study on object tracking quality under probabilistic coverage in sensor networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2005, v:9, n:1, pp:73-76 [Journal]
  21. Haining Wang, Danlu Zhang, Kang G. Shin
    Change-Point Monitoring for the Detection of DoS Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:4, pp:193-208 [Journal]
  22. Haining Wang, Abhijit Bose, Mohamed A. El-Gendy, Kang G. Shin
    IP Easy-pass: a light-weight network-edge resource access control. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2005, v:13, n:6, pp:1247-1260 [Journal]
  23. Haining Wang, Kang G. Shin
    Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:9, pp:873-884 [Journal]
  24. Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodong Zhang
    Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:3, pp:334-350 [Journal]
  25. Chuan Yue, Mengjun Xie, Haining Wang
    Automatic Cookie Usage Setting with CookiePicker. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:460-470 [Conf]
  26. Lei Guo, Xiaoning Ding, Haining Wang, Qun Li, Songqing Chen, Xiaodong Zhang
    Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  27. Xin Chen, Haining Wang, Shansi Ren, Xiaodong Zhang
    Maintaining Strong Cache Consistency for the Domain Name System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2007, v:19, n:8, pp:1057-1071 [Journal]
  28. Haining Wang, Cheng Jin, Kang G. Shin
    Defense against spoofed IP traffic using hop-count filtering. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2007, v:15, n:1, pp:40-53 [Journal]

  29. HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks. [Citation Graph (, )][DBLP]


  30. Anti-Phishing in Offense and Defense. [Citation Graph (, )][DBLP]


  31. Modeling and Analysis of a Shared Channel Architecture for Performance Improvement in Optical Burst Switched Networks. [Citation Graph (, )][DBLP]


  32. Detecting covert timing channels: an entropy-based approach. [Citation Graph (, )][DBLP]


  33. Battle of Botcraft: fighting bots in online games with human observational proofs. [Citation Graph (, )][DBLP]


  34. Efficient resource management on template-based web servers. [Citation Graph (, )][DBLP]


  35. SessionMagnifier: a simple approach to secure and convenient kiosk browsing. [Citation Graph (, )][DBLP]


  36. A Collaboration-based Autonomous Reputation System for Email Services. [Citation Graph (, )][DBLP]


  37. Tracking Skype VoIP Calls Over The Internet. [Citation Graph (, )][DBLP]


  38. Fast Detection of Denial-of-Service Attacks on IP Telephony. [Citation Graph (, )][DBLP]


  39. Secure Passwords Through Enhanced Hashing. [Citation Graph (, )][DBLP]


  40. Swift: A Fast Dynamic Packet Filter. [Citation Graph (, )][DBLP]


  41. Model-Based Covert Timing Channels: Automated Modeling and Evasion. [Citation Graph (, )][DBLP]


  42. Measurement and Classification of Humans and Bots in Internet Chat. [Citation Graph (, )][DBLP]


  43. Characterizing insecure javascript practices on the web. [Citation Graph (, )][DBLP]


  44. An automatic HTTP cookie management system. [Citation Graph (, )][DBLP]


  45. PowerTracer: Tracing requests in multi-tier services to save cluster power consumption [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002