Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays X Wang, DS Reeves Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 363 | 2003 |
Containment of Unknown and Polymorphic Fast Spreading Worms S Chen, X Wang US Patent App. 12/042,587, 2008 | 342 | 2008 |
Tracking anonymous peer-to-peer voip calls on the internet X Wang, S Chen, S Jajodia Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 337 | 2005 |
Network flow watermarking attack on low-latency anonymous communication systems X Wang, S Chen, S Jajodia 2007 IEEE Symposium on Security and Privacy (SP'07), 116-130, 2007 | 318 | 2007 |
Reformat: Automatic reverse engineering of encrypted messages Z Wang, X Jiang, W Cui, X Wang, M Grace Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 240 | 2009 |
Interval centroid based watermark X Wang, S Chen US Patent 7,724,782, 2010 | 229 | 2010 |
Inter-packet delay based correlation for tracing encrypted connections through stepping stones X Wang, DS Reeves, SF Wu Computer Security—ESORICS 2002: 7th European Symposium on Research in …, 2002 | 228 | 2002 |
Sleepy watermark tracing: An active network-based intrusion response framework X Wang, DS Reeves, SF Wu, J Yuill IFIP International Information Security Conference, 369-384, 2001 | 226 | 2001 |
“Out-of-the-box” monitoring of VM-based high-interaction honeypots X Jiang, X Wang International Workshop on Recent Advances in Intrusion Detection, 198-218, 2007 | 211 | 2007 |
Tracing traffic through intermediate hosts that repacketize flows YJ Pyun, YH Park, X Wang, DS Reeves, P Ning IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 161 | 2007 |
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction X Jiang, X Wang, D Xu ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010 | 159 | 2010 |
Countering persistent kernel rootkits through systematic hook discovery Z Wang, X Jiang, W Cui, X Wang Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 140 | 2008 |
Billing Attacks on SIP-Based VoIP Systems. R Zhang, X Wang, X Yang, X Jiang WOOT 7, 1-8, 2007 | 98 | 2007 |
A first step towards live botmaster traceback D Ramsbrock, X Wang, X Jiang International Workshop on Recent Advances in Intrusion Detection, 59-77, 2008 | 83 | 2008 |
Deciduous: Decentralized source identification for network-based intrusions HY Chang, R Narayan, SF Wu, BM Vetter, X Wang, M Brown, JJ Yuill, ... Integrated Network Management VI. Distributed Management for the Networked …, 1999 | 81 | 1999 |
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers R Zhang, X Wang, R Farley, X Yang, X Jiang Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 68 | 2009 |
Active timing-based correlation of perturbed traffic flows with chaff packets P Peng, P Ning, DS Reeves, X Wang 25th IEEE International Conference on Distributed Computing Systems …, 2005 | 67 | 2005 |
Robust correlation of encrypted attack traffic through stepping stones by flow watermarking X Wang, D Reeves IEEE Transactions on Dependable and Secure Computing 8 (3), 434-449, 2010 | 64 | 2010 |
Tracing based active intrusion response X Wang, DS Reeves, SF Wu Journal of Information Warfare 1 (1), 50-61, 2001 | 58 | 2001 |
On the anonymity and traceability of peer-to-peer VoIP calls S Chen, X Wang, S Jajodia IEEE Network 20 (5), 32-37, 2006 | 52 | 2006 |