Subject Areas
Currently Not Available
Published Items by Year
Keywords
Colleague Collaboration
Author’s Latest Publications
- Article
Mining Network Traffic Efficiently to Detect Stepping-Stone Intrusion
March 2012AINA '12: Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and Applicationshttps://doi.org/10.1109/AINA.2012.16 - Article
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching
April 2010AINA '10: Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applicationshttps://doi.org/10.1109/AINA.2010.12 - Article
A New Model to Detect Stepping-Stone Intrusion
October 2009IWCSE '09: Proceedings of the 2009 Second International Workshop on Computer Science and Engineering - Volume 01https://doi.org/10.1109/WCSE.2009.737 - Article
Applying Signal Processing Technology to Stepping-Stone Intrusion Detection
December 2008IITA '08: Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application - Volume 01https://doi.org/10.1109/IITA.2008.245 - Article
Finding TCP packet round-trip time for intrusion detection: algorithm and analysis
December 2006CANS'06: Proceedings of the 5th international conference on Cryptology and Network Securityhttps://doi.org/10.1007/11935070_21 - Article
Resistance analysis to intruders’ evasion of a novel algorithm to detect stepping-stone
September 2006ATC'06: Proceedings of the Third international conference on Autonomic and Trusted Computinghttps://doi.org/10.1007/11839569_46