2004 |
7 | EE | Stephanie Bryant,
Feiyi Wang:
Stephanie Bryant and Feiyi Wang, Aspects of adaptive reconfiguration in a scalable intrusion tolerant system, Complexity (2004) 9(2)74-83.
Complexity 9(4): 46 (2004) |
2003 |
6 | EE | Feiyi Wang,
Raghu Upppalli:
SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services-A Technology Summary.
DISCEX (2) 2003: 153- |
5 | EE | Stephanie Bryant,
Feiyi Wang:
Aspects of adaptive reconfiguration in a scalable intrusion tolerant system.
Complexity 9(2): 74-83 (2003) |
4 | EE | Rong Wang,
Feiyi Wang,
Gregory T. Byrd:
Design and implementation of Acceptance Monitor for building intrusion tolerant systems.
Softw., Pract. Exper. 33(14): 1399-1417 (2003) |
1998 |
3 | EE | Feiyi Wang,
Shyhtsun Felix Wu:
On the Vulnerabilities and Protection of OSPF Routing Protocol.
ICCCN 1998: 148-152 |
2 | EE | D. Qu,
Brain Vetter,
Feiyi Wang,
R. Narayan,
Shyhtsun Felix Wu,
Y. Frank Jou,
Fengmin Gong,
C. Sargor:
Statistical Anomaly Detection for Link-State Routing Protocols.
ICNP 1998: 62-70 |
1997 |
1 | EE | Brain Vetter,
Feiyi Wang,
Shyhtsun Felix Wu:
An experimental study of insider attacks for OSPF routing protocol.
ICNP 1997: 293-300 |