Data streaming algorithms for efficient and accurate estimation of flow size distribution A Kumar, M Sung, J Xu, J Wang ACM SIGMETRICS Performance Evaluation Review 32 (1), 177-188, 2004 | 375 | 2004 |
IP traceback-based intelligent packet filtering: A novel technique for defending against Internet DDoS attacks M Sung, J Xu IEEE Transactions on parallel and Distributed Systems 14 (9), 861-872, 2003 | 284 | 2003 |
Large-scale IP traceback in high-speed Internet: Practical techniques and theoretical foundation J Li, M Sung, J Xu, L Li IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 115-129, 2004 | 239 | 2004 |
Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation M Sung, J Xu, J Li, L Li IEEE/ACM Transactions on Networking 16 (6), 1253-1266, 2008 | 81 | 2008 |
A data streaming algorithm for estimating subpopulation flow size distribution A Kumar, M Sung, J Xu, EW Zegura Proceedings of the 2005 ACM SIGMETRICS international conference on …, 2005 | 58 | 2005 |
Mandatory human participation: A new authentication scheme for building secure systems J Xu, R Lipton, I Essa, M Sung, Y Zhu Proceedings. 12th International Conference on Computer Communications and …, 2003 | 23 | 2003 |
Scalable and efficient data streaming algorithms for detecting common content in internet traffic M Sung, A Kumar, L Li, J Wang, J Xu 22nd International Conference on Data Engineering Workshops (ICDEW'06), 27-27, 2006 | 14 | 2006 |
Analysis of DoS attack traffic data M Sung, M Haas, J Xu FIRST Conference. Hawaii, 2002 | 8 | 2002 |
Mandatory human participation: A new scheme for building secure systems I Essa, MH Sung, RJ Lipton, J Xu Georgia Institute of Technology, 2001 | 4 | 2001 |
Problem statement M Sung The Effect of Game_Based Learning (GBL) on Pre-School Students' Motivation …, 2011 | 1 | 2011 |
Scalable Hash-based IP Traceback using Rate-limited Probabilistic Packet Marking M Sung, J Chiang, JJ Xu Georgia Institute of Technology, 2006 | 1 | 2006 |
Scalable and efficient distributed algorithms for defending against malicious Internet activity M Sung Georgia Institute of Technology, 2006 | | 2006 |
Mandatory Human Participation: A New Authentication Scheme J Xu, R Lipton, I Essa, M Sung, Y Zhu | | 2003 |