Ikuti
Haining Wang
Haining Wang
Professor of ECE, Virginia Tech
Email yang diverifikasi di vt.edu
Judul
Dikutip oleh
Dikutip oleh
Tahun
Detecting SYN flooding attacks
H Wang, D Zhang, KG Shin
Proceedings. Twenty-first annual joint conference of the IEEE computer and …, 2002
10362002
Detecting automation of twitter accounts: Are you a human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
IEEE Transactions on dependable and secure computing 9 (6), 811-824, 2012
9722012
Who is tweeting on Twitter: human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
Proceedings of the 26th annual computer security applications conference, 21-30, 2010
7992010
Hop-count filtering: an effective defense against spoofed DDoS traffic
C Jin, H Wang, KG Shin
Proceedings of the 10th ACM conference on Computer and communications …, 2003
7842003
Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud
Z Wu, Z Xu, H Wang
IEEE/ACM Transactions on Networking 23 (2), 603-615, 2014
4862014
Defense against spoofed IP traffic using hop-count filtering
H Wang, C Jin, KG Shin
IEEE/ACM Transactions on networking 15 (1), 40-53, 2007
4862007
You are how you touch: User verification on smartphones via tapping behaviors
N Zheng, K Bai, H Huang, H Wang
2014 IEEE 22nd International Conference on Network Protocols, 221-232, 2014
4112014
Change-point monitoring for the detection of DoS attacks
H Wang, D Zhang, KG Shin
IEEE Transactions on dependable and secure computing 1 (4), 193-208, 2004
3662004
An efficient user verification system via mouse movements
N Zheng, A Paloski, H Wang
Proceedings of the 18th ACM conference on Computer and communications …, 2011
3482011
Detecting covert timing channels: an entropy-based approach
S Gianvecchio, H Wang
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2622007
Detecting social spam campaigns on twitter
Z Chu, I Widjaja, H Wang
Applied Cryptography and Network Security: 10th International Conference …, 2012
2222012
Enhancing cache robustness for content-centric networking
M Xie, I Widjaja, H Wang
2012 Proceedings IEEE INFOCOM, 2426-2434, 2012
2172012
Detecting VoIP floods using the Hellinger distance
H Sengar, H Wang, D Wijesekera, S Jajodia
IEEE transactions on parallel and distributed systems 19 (6), 794-805, 2008
2112008
Model-based covert timing channels: Automated modeling and evasion
S Gianvecchio, H Wang, D Wijesekera, S Jajodia
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
2072008
High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
2032016
Acquisitional rule-based engine for discovering {Internet-of-Things} devices
X Feng, Q Li, H Wang, L Sun
27th USENIX security symposium (USENIX Security 18), 327-341, 2018
1932018
Containerleaks: Emerging security threats of information leakages in container clouds
X Gao, Z Gu, M Kayaalp, D Pendarakis, H Wang
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
1792017
Characterizing insecure JavaScript practices on the web
C Yue, H Wang
Proceedings of the 18th international conference on World wide web, 961-970, 2009
1712009
An entropy-based approach to detecting covert timing channels
S Gianvecchio, H Wang
IEEE Transactions on Dependable and Secure Computing 8 (6), 785-797, 2010
1682010
Profiling online social behaviors for compromised account detection
X Ruan, Z Wu, H Wang, S Jajodia
IEEE transactions on information forensics and security 11 (1), 176-187, 2015
1582015
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20