Xinyuan Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

17EERuishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui Yang, Xuxian Jiang: On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. ASIACCS 2009: 61-69
16EERuishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Farley, Xuxian Jiang: An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems. ISPEC 2009: 59-70
15EEZhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang: Countering Persistent Kernel Rootkits through Systematic Hook Discovery. RAID 2008: 21-38
14EEDaniel Ramsbrock, Xinyuan Wang, Xuxian Jiang: A First Step towards Live Botmaster Traceback. RAID 2008: 59-77
13EEXuxian Jiang, Xinyuan Wang, Dongyan Xu: Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. ACM Conference on Computer and Communications Security 2007: 128-138
12EEXinyuan Wang, Shiping Chen, Sushil Jajodia: Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. IEEE Symposium on Security and Privacy 2007: 116-130
11EEYoung June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning: Tracing Traffic through Intermediate Hosts that Repacketize Flows. INFOCOM 2007: 634-642
10EEXuxian Jiang, Xinyuan Wang: "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. RAID 2007: 198-218
9EESongqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang: WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. ANCS 2006: 173-182
8EEShiping Chen, Xinyuan Wang, Sushil Jajodia: On the anonymity and traceability of peer-to-peer VoIP calls. IEEE Network 20(5): 32-37 (2006)
7EEXinyuan Wang: The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. IJSN 1(3/4): 184-197 (2006)
6EEXinyuan Wang, Shiping Chen, Sushil Jajodia: Tracking anonymous peer-to-peer VoIP calls on the internet. ACM Conference on Computer and Communications Security 2005: 81-91
5EEPai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang: Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. ICDCS Workshops 2005: 107-113
4EEXinyuan Wang: The loop fallacy and serialization in tracing intrusion connections through stepping stones. SAC 2004: 404-411
3EEXinyuan Wang, Douglas S. Reeves: Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. ACM Conference on Computer and Communications Security 2003: 20-29
2EEXinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu: Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. ESORICS 2002: 244-263
1 Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill: Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. SEC 2001: 369-384

Coauthor Index

1Shiping Chen [6] [8] [12]
2Songqing Chen [9]
3Weidong Cui [15]
4Ryan Farley [16] [17]
5Sushil Jajodia [6] [8] [12]
6Xuxian Jiang [10] [13] [14] [15] [16] [17]
7Lei Liu [9]
8Peng Ning [5] [11]
9Young Hee Park [11]
10Pai Peng [5]
11Young June Pyun [11]
12Daniel Ramsbrock [14]
13Douglas S. Reeves [1] [2] [3] [5] [11]
14Zhi Wang [15]
15Shyhtsun Felix Wu [1] [2]
16Dongyan Xu [13]
17Xiaohui Yang [16] [17]
18Jim Yuill [1]
19Ruishan Zhang [16] [17]
20Xinwen Zhang [9]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)