The SCEAS System
Navigation Menu

Search the dblp DataBase


Xinyuan Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xinyuan Wang, Shiping Chen, Sushil Jajodia
    Tracking anonymous peer-to-peer VoIP calls on the internet. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:81-91 [Conf]
  2. Xinyuan Wang, Douglas S. Reeves
    Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:20-29 [Conf]
  3. Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu
    Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:244-263 [Conf]
  4. Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang
    Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:107-113 [Conf]
  5. Xinyuan Wang
    The loop fallacy and serialization in tracing intrusion connections through stepping stones. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:404-411 [Conf]
  6. Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill
    Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:369-384 [Conf]
  7. Xinyuan Wang, Shiping Chen, Sushil Jajodia
    Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:116-130 [Conf]
  8. Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
    WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. [Citation Graph (0, 0)][DBLP]
    ANCS, 2006, pp:173-182 [Conf]
  9. Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning
    Tracing Traffic through Intermediate Hosts that Repacketize Flows. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:634-642 [Conf]
  10. Xuxian Jiang, Xinyuan Wang
    "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:198-218 [Conf]

  11. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. [Citation Graph (, )][DBLP]

  12. On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. [Citation Graph (, )][DBLP]

  13. On the effectiveness of low latency anonymous network in the presence of timing attack. [Citation Graph (, )][DBLP]

  14. ReFormat: Automatic Reverse Engineering of Encrypted Messages. [Citation Graph (, )][DBLP]

  15. An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems. [Citation Graph (, )][DBLP]

  16. Countering Persistent Kernel Rootkits through Systematic Hook Discovery. [Citation Graph (, )][DBLP]

  17. A First Step towards Live Botmaster Traceback. [Citation Graph (, )][DBLP]

  18. Roving Bugnet: Distributed Surveillance Threat and Mitigation. [Citation Graph (, )][DBLP]

  19. On the billing vulnerabilities of SIP-based VoIP systems. [Citation Graph (, )][DBLP]

  20. Roving bugnet: Distributed surveillance threat and mitigation. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002