2009 |
66 | EE | Jedidiah R. Crandall,
John Brevik,
Shaozhi Ye,
Gary Wassermann,
Daniela A. S. de Oliveira,
Zhendong Su,
Shyhtsun Felix Wu,
Frederic T. Chong:
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Transactions on Computational Science 4: 244-262 (2009) |
2008 |
65 | EE | Xiaoming Lu,
Matt Spear,
Karl N. Levitt,
Norman S. Matloff,
Shyhtsun Felix Wu:
Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks.
ICC 2008: 2309-2316 |
64 | EE | Xiaoming Lu,
Matt Spear,
Karl N. Levitt,
Shyhtsun Felix Wu:
iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks.
INFOCOM 2008: 968-976 |
63 | EE | Ryan Iwahashi,
Daniela A. S. de Oliveira,
Shyhtsun Felix Wu,
Jedidiah R. Crandall,
Young-Jun Heo,
Jin-Tae Oh,
Jong-Soo Jang:
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets.
ISC 2008: 114-130 |
62 | EE | Daniela A. S. de Oliveira,
Jedidiah R. Crandall,
Gary Wassermann,
Shaozhi Ye,
Shyhtsun Felix Wu,
Zhendong Su,
Frederic T. Chong:
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks.
NOMS 2008: 121-128 |
61 | EE | Senthilkumar G. Cheetancheri,
John Mark Agosta,
Karl N. Levitt,
Shyhtsun Felix Wu,
Jeff Rowe:
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.
RAID 2008: 231-250 |
60 | EE | Xiaoming Lu,
Matt Spear,
Karl N. Levitt,
Norman S. Matloff,
Shyhtsun Felix Wu:
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols.
SECURWARE 2008: 403-411 |
2007 |
59 | | Deep Medhi,
José Marcos S. Nogueira,
Tom Pfeifer,
Shyhtsun Felix Wu:
IP Operations and Management, 7th IEEE International Workshop, IPOM 2007, San José, USA, October 31 - November 2, 2007, Proceedings
Springer 2007 |
58 | EE | Shih-Ming Tseng,
Ke Zhang,
Shyhtsun Felix Wu,
Kwan-Liu Ma,
Soon Tee Teoh,
Xiaoliang Zhao:
Analysis of BGP Origin AS Changes Among Brazil-Related Autonomous Systems.
IPOM 2007: 49-60 |
57 | EE | Yanyan Yang,
Charles U. Martel,
Shyhtsun Felix Wu:
CLID: A general approach to validate security policies in a dynamic network.
Integrated Network Management 2007: 1-10 |
56 | EE | F. Zhao,
V. R. Vemuri,
Shyhtsun Felix Wu,
F. Xue,
S. J. Ben Yoo:
Interactive Informatics on Internet Infrastructure.
Integrated Network Management 2007: 90-99 |
55 | EE | Ke Zhang,
Shyhtsun Felix Wu:
Filter-Based RFD: Can We Stabilize Network Without Sacrificing Reachability Too Much?
Networking 2007: 1200-1203 |
54 | EE | Dimitri do B. DeFigueiredo,
Balaji Venkatachalam,
Shyhtsun Felix Wu:
Bounds on the Performance of P2P Networks Using Tit-for-Tat Strategies.
Peer-to-Peer Computing 2007: 11-18 |
2006 |
53 | EE | Daniela A. S. de Oliveira,
Jedidiah R. Crandall,
Gary Wassermann,
Shyhtsun Felix Wu,
Zhendong Su,
Frederic T. Chong:
ExecRecorder: VM-based full-system replay for attack analysis and system recovery.
ASID 2006: 66-71 |
52 | EE | Jedidiah R. Crandall,
Gary Wassermann,
Daniela A. S. de Oliveira,
Zhendong Su,
Shyhtsun Felix Wu,
Frederic T. Chong:
Temporal search: detecting hidden malware timebombs with virtual machines.
ASPLOS 2006: 25-36 |
51 | EE | Henric Johnson,
Lennart Isaksson,
Markus Fiedler,
Shyhtsun Felix Wu:
A Decision System for Adequate Authentication.
ICN/ICONS/MCL 2006: 185 |
50 | EE | Henric Johnson,
B. Qaisrani,
Markus Fiedler,
Arne A. Nilsson,
Shyhtsun Felix Wu:
Hierarchical Defense Structure for Mitigating DoS Attacks.
ICN/ICONS/MCL 2006: 83 |
49 | EE | He Huang,
Shyhtsun Felix Wu:
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers.
NOMS 2006: 414-423 |
48 | EE | Yanyan Yang,
Charles U. Martel,
Zhi (Judy) Fu,
Shyhtsun Felix Wu:
IPsec/VPN security policy correctness and assurance.
J. High Speed Networks 15(3): 275-289 (2006) |
47 | EE | Jedidiah R. Crandall,
Shyhtsun Felix Wu,
Frederic T. Chong:
Minos: Architectural support for protecting control data.
TACO 3(4): 359-389 (2006) |
2005 |
46 | EE | Jedidiah R. Crandall,
Zhendong Su,
Shyhtsun Felix Wu,
Frederic T. Chong:
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
ACM Conference on Computer and Communications Security 2005: 235-248 |
45 | EE | Seung-Sun Hong,
Fiona Wong,
Shyhtsun Felix Wu,
Bjorn Lilja,
Tony Y. Yohansson,
Henric Johnson,
Ame Nelsson:
TCPtransform: Property-Oriented TCP Traffic Transformation.
DIMVA 2005: 222-240 |
44 | EE | Jedidiah R. Crandall,
Shyhtsun Felix Wu,
Frederic T. Chong:
Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities.
DIMVA 2005: 32-50 |
43 | EE | Ke Zhang,
Soon Tee Teoh,
Shih-Ming Tseng,
Rattapon Limprasittiporn,
Kwan-Liu Ma,
Shyhtsun Felix Wu,
Chen-Nee Chuah:
Performing BGP Experiments on a Semi-realistic Internet Testbed Environment.
ICDCS Workshops 2005: 130-136 |
42 | EE | Seung-Sun Hong,
Shyhtsun Felix Wu:
On Interactive Internet Traffic Replay.
RAID 2005: 247-264 |
41 | | Wayne Huang,
J. L. Cong,
Chien-Long Wu,
Fan Zhao,
Shyhtsun Felix Wu:
Design, Implementation, and Evaluation of "FRiTrace".
SEC 2005: 343-358 |
40 | EE | Kihun Hong,
Souhwan Jung,
Shyhtsun Felix Wu:
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network.
WISA 2005: 96-107 |
2004 |
39 | EE | Gregory L. Wittel,
Shyhtsun Felix Wu:
On Attacking Statistical Spam Filters.
CEAS 2004 |
38 | EE | Souhwan Jung,
Fan Zhao,
Shyhtsun Felix Wu,
HyunGon Kim:
Threat Analysis on NEtwork MObility (NEMO).
ICICS 2004: 331-342 |
37 | EE | Ke Zhang,
Amy Yen,
Xiaoliang Zhao,
Daniel Massey,
Shyhtsun Felix Wu,
Lixia Zhang:
On Detection of Anomalous Routing Dynamics in BGP.
NETWORKING 2004: 259-270 |
36 | EE | Archana Pasupulati,
Jason Coit,
Karl N. Levitt,
Shyhtsun Felix Wu,
S. H. Li,
J. C. Kuo,
K. P. Fan:
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities.
NOMS (1) 2004: 235-248 |
35 | EE | Yanyan Yang,
Charles U. Martel,
Shyhtsun Felix Wu:
On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies.
NOMS (1) 2004: 277-290 |
34 | EE | Jürgen Schönwälder,
Aiko Pras,
Shyhtsun Felix Wu,
Bert Wijnen,
Loris Degioanni:
Panel three: Monitoring and controlling networks: Have we lost control of our networks?
NOMS (1) 2004: 915 |
33 | EE | Soon Tee Teoh,
Ke Zhang,
Shih-Ming Tseng,
Kwan-Liu Ma,
Shyhtsun Felix Wu:
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP.
VizSEC 2004: 35-44 |
32 | EE | Ruzena Bajcsy,
Terry Benzel,
Matt Bishop,
Robert Braden,
Carla E. Brodley,
Sonia Fahmy,
Sally Floyd,
W. Hardaker,
Anthony D. Joseph,
George Kesidis,
Karl N. Levitt,
Robert Lindell,
Peng Liu,
David Miller,
Russ Mundy,
Cliford Neuman,
Ron Ostrenga,
Vern Paxson,
Phillip A. Porras,
Catherine Rosenberg,
J. Doug Tygar,
Shankar Sastry,
Daniel F. Sterne,
Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation.
Commun. ACM 47(3): 58-61 (2004) |
31 | EE | Soon Tee Teoh,
Kwan-Liu Ma,
Shyhtsun Felix Wu,
T. J. Jankun-Kelly:
Detecting Flaws and Intruders with Visual Data Analysis.
IEEE Computer Graphics and Applications 24(5): 27-35 (2004) |
2003 |
30 | EE | Xiaoliang Zhao,
Daniel Massey,
Shyhtsun Felix Wu,
Mohit Lad,
Dan Pei,
Lan Wang,
Lixia Zhang:
Understanding BGP Behavior through a Study of DoD Prefixes.
DISCEX (1) 2003: 214-225 |
29 | EE | Dan Pei,
Lan Wang,
Daniel Massey,
Shyhtsun Felix Wu,
Lixia Zhang:
A Study of Packet Delivery Performance during Routing Convergence.
DSN 2003: 183-192 |
28 | EE | Soon Tee Teoh,
Kwan-Liu Ma,
Shyhtsun Felix Wu,
Daniel Massey,
Xiaoliang Zhao,
Dan Pei,
Lan Wang,
Lixia Zhang,
Randy Bush:
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events.
DSOM 2003: 155-168 |
27 | EE | Lan Wang,
Xiaoliang Zhao,
Dan Pei,
Randy Bush,
Daniel Massey,
Allison Mankin,
Shyhtsun Felix Wu,
Lixia Zhang:
Protecting BGP Routes to Top Level DNS Servers.
ICDCS 2003: 322-331 |
26 | | Soon Tee Teoh,
Kwan-Liu Ma,
Shyhtsun Felix Wu:
A Visual Exploration Process for the Analysis of Internet Routing Data.
IEEE Visualization 2003: 523-530 |
25 | | Yanyan Yang,
Zhi (Judy) Fu,
Shyhtsun Felix Wu:
BANDS: An Inter-domain Internet Security Policy Management System for IPSec/VPN.
Integrated Network Management 2003: 231-244 |
24 | EE | He Huang,
Shyhtsun Felix Wu:
An approach to certificate path discovery in mobile Ad Hoc networks.
SASN 2003: 41-52 |
2002 |
23 | EE | Xiaoliang Zhao,
Dan Pei,
Lan Wang,
Daniel Massey,
Allison Mankin,
Shyhtsun Felix Wu,
Lixia Zhang:
Detection of Invalid Routing Announcement in the Internet.
DSN 2002: 59-68 |
22 | EE | Xinyuan Wang,
Douglas S. Reeves,
Shyhtsun Felix Wu:
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.
ESORICS 2002: 244-263 |
21 | EE | Soon Tee Teoh,
Kwan-Liu Ma,
Shyhtsun Felix Wu,
Xiaoliang Zhao:
Case Study: Interactive Visualization for Internet Security.
IEEE Visualization 2002 |
20 | EE | Dan Pei,
Xiaoliang Zhao,
Lan Wang,
Daniel Massey,
Allison Mankin,
Shyhtsun Felix Wu,
Lixia Zhang:
Improving BGP Convergence Through Consistency Assertions.
INFOCOM 2002 |
19 | EE | Lan Wang,
Xiaoliang Zhao,
Dan Pei,
Randy Bush,
Daniel Massey,
Allison Mankin,
Shyhtsun Felix Wu,
Lixia Zhang:
Observation and analysis of BGP behavior under stress.
Internet Measurement Workshop 2002: 183-195 |
2001 |
18 | EE | Xiaoliang Zhao,
Dan Pei,
Lan Wang,
Daniel Massey,
Allison Mankin,
Shyhtsun Felix Wu,
Lixia Zhang:
An analysis of BGP multiple origin AS (MOAS) conflicts.
Internet Measurement Workshop 2001: 31-35 |
17 | EE | Zhi Fu,
Shyhtsun Felix Wu,
He Huang,
Kung Loh,
Fengmin Gong,
Ilia Baldine,
Chong Xu:
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution.
POLICY 2001: 39-56 |
16 | | Xinyuan Wang,
Douglas S. Reeves,
Shyhtsun Felix Wu,
Jim Yuill:
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.
SEC 2001: 369-384 |
15 | EE | Ho-Yen Chang,
Shyhtsun Felix Wu,
Y. Frank Jou:
Real-time protocol analysis for detecting link-state routing protocol attacks.
ACM Trans. Inf. Syst. Secur. 4(1): 1-36 (2001) |
2000 |
14 | | Hervé Debar,
Ludovic Mé,
Shyhtsun Felix Wu:
Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings
Springer 2000 |
13 | EE | Xiaobing Zhang,
Shyhtsun Felix Wu,
Zhi Fu,
Tsung-Li Wu:
Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It.
ICNP 2000: 263-272 |
12 | EE | Zhi Fu,
He Huang,
Tsung-Li Wu,
Shyhtsun Felix Wu,
Fengmin Gong,
Chong Xu,
Ilia Baldine:
ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol.
NOMS 2000: 565-578 |
11 | EE | Jim Yuill,
Shyhtsun Felix Wu,
J. Settle,
Fengmin Gong,
R. Forno,
Ming-Yuh Huang,
J. Asbery:
Intrusion-detection for incident-response, using a military battlefield-intelligence process.
Computer Networks 34(4): 671-697 (2000) |
1999 |
10 | EE | Jim Yuill,
Shyhtsun Felix Wu,
Fengmin Gong,
Ming-Yuh Huang:
Intrusion Detection for an On-Going Attack.
Recent Advances in Intrusion Detection 1999 |
1998 |
9 | EE | Feiyi Wang,
Shyhtsun Felix Wu:
On the Vulnerabilities and Protection of OSPF Routing Protocol.
ICCCN 1998: 148-152 |
8 | EE | D. Qu,
Brain Vetter,
Feiyi Wang,
R. Narayan,
Shyhtsun Felix Wu,
Y. Frank Jou,
Fengmin Gong,
C. Sargor:
Statistical Anomaly Detection for Link-State Routing Protocols.
ICNP 1998: 62-70 |
1997 |
7 | EE | Brain Vetter,
Feiyi Wang,
Shyhtsun Felix Wu:
An experimental study of insider attacks for OSPF routing protocol.
ICNP 1997: 293-300 |
6 | EE | Jatin N. Hansoty,
Mladen A. Vouk,
Shyhtsun Felix Wu:
LAVA: Secure Delegation of Mobile Applets: Design, Implementation, and Applications.
WETICE 1997: 242-247 |
1996 |
5 | EE | Shyhtsun Felix Wu:
Sleepy Network-Layer Authentication Service for IPSEC.
ESORICS 1996: 146-159 |
1991 |
4 | EE | Steven S. Popovich,
Shyhtsun Felix Wu,
Gail E. Kaiser:
An object-based approach to implementing distributed concurrency control.
ICDCS 1991: 65-72 |
3 | | Steven S. Popovich,
Gail E. Kaiser,
Shyhtsun Felix Wu:
MELDing transactions and objects.
OOPS Messenger 2(2): 94-98 (1991) |
1990 |
2 | EE | Gail E. Kaiser,
Wenwey Hseush,
Steven S. Popovich,
Shyhtsun Felix Wu:
Multiple concurrency control policies in an object-oriented programming system.
SPDP 1990: 623-626 |
1989 |
1 | | Gail E. Kaiser,
Steven S. Popovich,
Wenwey Hseush,
Shyhtsun Felix Wu:
MELDing Multiple Granularities of Parallelism.
ECOOP 1989: 147-166 |