2001 |
9 | EE | Zhi Fu,
Shyhtsun Felix Wu,
He Huang,
Kung Loh,
Fengmin Gong,
Ilia Baldine,
Chong Xu:
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution.
POLICY 2001: 39-56 |
2000 |
8 | | Chong Xu,
Fengmin Gong,
Ilia Baldine,
Liang Han,
Xinzhou Qin:
Building Security-Aware Applications on Celestial Network Security Management Infrastructure.
International Conference on Internet Computing 2000: 219-226 |
7 | EE | Zhi Fu,
He Huang,
Tsung-Li Wu,
Shyhtsun Felix Wu,
Fengmin Gong,
Chong Xu,
Ilia Baldine:
ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol.
NOMS 2000: 565-578 |
6 | EE | Jim Yuill,
Shyhtsun Felix Wu,
J. Settle,
Fengmin Gong,
R. Forno,
Ming-Yuh Huang,
J. Asbery:
Intrusion-detection for incident-response, using a military battlefield-intelligence process.
Computer Networks 34(4): 671-697 (2000) |
1999 |
5 | EE | Jim Yuill,
Shyhtsun Felix Wu,
Fengmin Gong,
Ming-Yuh Huang:
Intrusion Detection for an On-Going Attack.
Recent Advances in Intrusion Detection 1999 |
1998 |
4 | EE | D. Qu,
Brain Vetter,
Feiyi Wang,
R. Narayan,
Shyhtsun Felix Wu,
Y. Frank Jou,
Fengmin Gong,
C. Sargor:
Statistical Anomaly Detection for Link-State Routing Protocols.
ICNP 1998: 62-70 |
1996 |
3 | EE | Fengmin Gong,
Guru M. Parulkar:
An application-oriented error control scheme for high-speed networks.
IEEE/ACM Trans. Netw. 4(5): 669-683 (1996) |
1994 |
2 | | Steven L. Blake,
Sarah A. Rajala,
Fengmin Gong,
Tony L. Mitchell:
Efficient Techniques for Two-Layer Coding of Video Sequences.
ICIP (1) 1994: 253-257 |
1 | | Fengmin Gong,
Guru M. Parulkar:
Study of Two-Level Flow Control Scheme and Buffering Strategies.
INFOCOM 1994: 1224-1233 |