| 2008 |
| 11 | EE | Yow Tzu Lim,
Pau-Chen Cheng,
Pankaj Rohatgi,
John Andrew Clark:
MLS security policy evolution with genetic programming.
GECCO 2008: 1571-1578 |
| 10 | EE | Yow Tzu Lim,
Pau-Chen Cheng,
John Andrew Clark,
Pankaj Rohatgi:
Policy evolution with Genetic Programming: A comparison of three approaches.
IEEE Congress on Evolutionary Computation 2008: 1792-1800 |
| 9 | EE | Yow Tzu Lim,
Pau-Chen Cheng,
John Andrew Clark,
Pankaj Rohatgi:
Policy Evolution with Grammatical Evolution.
SEAL 2008: 71-80 |
| 2007 |
| 8 | EE | Pau-Chen Cheng,
Pankaj Rohatgi,
Claudia Keser,
Paul A. Karger,
Grant M. Wagner,
Angela Schuett Reninger:
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control.
IEEE Symposium on Security and Privacy 2007: 222-230 |
| 7 | EE | Kang-Won Lee,
Suresh Chari,
Anees Shaikh,
Sambit Sahu,
Pau-Chen Cheng:
Improving the resilience of content distribution networks to large scale distributed denial of service attacks.
Computer Networks 51(10): 2753-2770 (2007) |
| 2003 |
| 6 | EE | Suresh Chari,
Pau-Chen Cheng:
BlueBoX: A policy-driven, host-based intrusion detection system.
ACM Trans. Inf. Syst. Secur. 6(2): 173-200 (2003) |
| 2002 |
| 5 | EE | Suresh Chari,
Pau-Chen Cheng:
BlueBox: A Policy-Driven, Host-Based Intrusion Detection System.
NDSS 2002 |
| 2001 |
| 4 | EE | Pau-Chen Cheng:
An architecture for the Internet Key Exchange Protocol.
IBM Systems Journal 40(3): 721-746 (2001) |
| 2000 |
| 3 | EE | Ran Canetti,
Pau-Chen Cheng,
Frederique Giraud,
Dimitrios E. Pendarakis,
Josyula R. Rao,
Pankaj Rohatgi,
Debanjan Saha:
An IPSec-based Host Architecture for Secure Internet Multicast.
NDSS 2000 |
| 1998 |
| 2 | | Pau-Chen Cheng,
Juan A. Garay,
Amir Herzberg,
Hugo Krawczyk:
A Security Architecture for the Internet Protocol.
IBM Systems Journal 37(1): 42-60 (1998) |
| 1995 |
| 1 | | Pau-Chen Cheng,
Juan A. Garay,
Amir Herzberg,
Hugo Krawczyk:
Securing the Internet (Abstract).
PODC 1995: 257 |