2008 |
11 | EE | Yow Tzu Lim,
Pau-Chen Cheng,
Pankaj Rohatgi,
John Andrew Clark:
MLS security policy evolution with genetic programming.
GECCO 2008: 1571-1578 |
10 | EE | Yow Tzu Lim,
Pau-Chen Cheng,
John Andrew Clark,
Pankaj Rohatgi:
Policy evolution with Genetic Programming: A comparison of three approaches.
IEEE Congress on Evolutionary Computation 2008: 1792-1800 |
9 | EE | Yow Tzu Lim,
Pau-Chen Cheng,
John Andrew Clark,
Pankaj Rohatgi:
Policy Evolution with Grammatical Evolution.
SEAL 2008: 71-80 |
2007 |
8 | EE | Pau-Chen Cheng,
Pankaj Rohatgi,
Claudia Keser,
Paul A. Karger,
Grant M. Wagner,
Angela Schuett Reninger:
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control.
IEEE Symposium on Security and Privacy 2007: 222-230 |
7 | EE | Kang-Won Lee,
Suresh Chari,
Anees Shaikh,
Sambit Sahu,
Pau-Chen Cheng:
Improving the resilience of content distribution networks to large scale distributed denial of service attacks.
Computer Networks 51(10): 2753-2770 (2007) |
2003 |
6 | EE | Suresh Chari,
Pau-Chen Cheng:
BlueBoX: A policy-driven, host-based intrusion detection system.
ACM Trans. Inf. Syst. Secur. 6(2): 173-200 (2003) |
2002 |
5 | EE | Suresh Chari,
Pau-Chen Cheng:
BlueBox: A Policy-Driven, Host-Based Intrusion Detection System.
NDSS 2002 |
2001 |
4 | EE | Pau-Chen Cheng:
An architecture for the Internet Key Exchange Protocol.
IBM Systems Journal 40(3): 721-746 (2001) |
2000 |
3 | EE | Ran Canetti,
Pau-Chen Cheng,
Frederique Giraud,
Dimitrios E. Pendarakis,
Josyula R. Rao,
Pankaj Rohatgi,
Debanjan Saha:
An IPSec-based Host Architecture for Secure Internet Multicast.
NDSS 2000 |
1998 |
2 | | Pau-Chen Cheng,
Juan A. Garay,
Amir Herzberg,
Hugo Krawczyk:
A Security Architecture for the Internet Protocol.
IBM Systems Journal 37(1): 42-60 (1998) |
1995 |
1 | | Pau-Chen Cheng,
Juan A. Garay,
Amir Herzberg,
Hugo Krawczyk:
Securing the Internet (Abstract).
PODC 1995: 257 |