Search the dblp DataBase
Xinyuan Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Xinyuan Wang , Shiping Chen , Sushil Jajodia Tracking anonymous peer-to-peer VoIP calls on the internet. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:81-91 [Conf ] Xinyuan Wang , Douglas S. Reeves Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:20-29 [Conf ] Xinyuan Wang , Douglas S. Reeves , Shyhtsun Felix Wu Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. [Citation Graph (0, 0)][DBLP ] ESORICS, 2002, pp:244-263 [Conf ] Pai Peng , Peng Ning , Douglas S. Reeves , Xinyuan Wang Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:107-113 [Conf ] Xinyuan Wang The loop fallacy and serialization in tracing intrusion connections through stepping stones. [Citation Graph (0, 0)][DBLP ] SAC, 2004, pp:404-411 [Conf ] Xinyuan Wang , Douglas S. Reeves , Shyhtsun Felix Wu , Jim Yuill Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:369-384 [Conf ] Xinyuan Wang , Shiping Chen , Sushil Jajodia Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:116-130 [Conf ] Songqing Chen , Xinyuan Wang , Lei Liu , Xinwen Zhang WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. [Citation Graph (0, 0)][DBLP ] ANCS, 2006, pp:173-182 [Conf ] Young June Pyun , Young Hee Park , Xinyuan Wang , Douglas S. Reeves , Peng Ning Tracing Traffic through Intermediate Hosts that Repacketize Flows. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:634-642 [Conf ] Xuxian Jiang , Xinyuan Wang "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. [Citation Graph (0, 0)][DBLP ] RAID, 2007, pp:198-218 [Conf ] Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. [Citation Graph (, )][DBLP ] On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. [Citation Graph (, )][DBLP ] On the effectiveness of low latency anonymous network in the presence of timing attack. [Citation Graph (, )][DBLP ] ReFormat: Automatic Reverse Engineering of Encrypted Messages. [Citation Graph (, )][DBLP ] An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems. [Citation Graph (, )][DBLP ] Countering Persistent Kernel Rootkits through Systematic Hook Discovery. [Citation Graph (, )][DBLP ] A First Step towards Live Botmaster Traceback. [Citation Graph (, )][DBLP ] Roving Bugnet: Distributed Surveillance Threat and Mitigation. [Citation Graph (, )][DBLP ] On the billing vulnerabilities of SIP-based VoIP systems. [Citation Graph (, )][DBLP ] Roving bugnet: Distributed surveillance threat and mitigation. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs