dblp.uni-trier.dewww.uni-trier.de

Shyhtsun Felix Wu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
66EEJedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong: Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. Transactions on Computational Science 4: 244-262 (2009)
2008
65EEXiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu: Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks. ICC 2008: 2309-2316
64EEXiaoming Lu, Matt Spear, Karl N. Levitt, Shyhtsun Felix Wu: iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks. INFOCOM 2008: 968-976
63EERyan Iwahashi, Daniela A. S. de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jin-Tae Oh, Jong-Soo Jang: Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. ISC 2008: 114-130
62EEDaniela A. S. de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shaozhi Ye, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong: Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. NOMS 2008: 121-128
61EESenthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe: Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. RAID 2008: 231-250
60EEXiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu: A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. SECURWARE 2008: 403-411
2007
59 Deep Medhi, José Marcos S. Nogueira, Tom Pfeifer, Shyhtsun Felix Wu: IP Operations and Management, 7th IEEE International Workshop, IPOM 2007, San José, USA, October 31 - November 2, 2007, Proceedings Springer 2007
58EEShih-Ming Tseng, Ke Zhang, Shyhtsun Felix Wu, Kwan-Liu Ma, Soon Tee Teoh, Xiaoliang Zhao: Analysis of BGP Origin AS Changes Among Brazil-Related Autonomous Systems. IPOM 2007: 49-60
57EEYanyan Yang, Charles U. Martel, Shyhtsun Felix Wu: CLID: A general approach to validate security policies in a dynamic network. Integrated Network Management 2007: 1-10
56EEF. Zhao, V. R. Vemuri, Shyhtsun Felix Wu, F. Xue, S. J. Ben Yoo: Interactive Informatics on Internet Infrastructure. Integrated Network Management 2007: 90-99
55EEKe Zhang, Shyhtsun Felix Wu: Filter-Based RFD: Can We Stabilize Network Without Sacrificing Reachability Too Much? Networking 2007: 1200-1203
54EEDimitri do B. DeFigueiredo, Balaji Venkatachalam, Shyhtsun Felix Wu: Bounds on the Performance of P2P Networks Using Tit-for-Tat Strategies. Peer-to-Peer Computing 2007: 11-18
2006
53EEDaniela A. S. de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong: ExecRecorder: VM-based full-system replay for attack analysis and system recovery. ASID 2006: 66-71
52EEJedidiah R. Crandall, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong: Temporal search: detecting hidden malware timebombs with virtual machines. ASPLOS 2006: 25-36
51EEHenric Johnson, Lennart Isaksson, Markus Fiedler, Shyhtsun Felix Wu: A Decision System for Adequate Authentication. ICN/ICONS/MCL 2006: 185
50EEHenric Johnson, B. Qaisrani, Markus Fiedler, Arne A. Nilsson, Shyhtsun Felix Wu: Hierarchical Defense Structure for Mitigating DoS Attacks. ICN/ICONS/MCL 2006: 83
49EEHe Huang, Shyhtsun Felix Wu: An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers. NOMS 2006: 414-423
48EEYanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shyhtsun Felix Wu: IPsec/VPN security policy correctness and assurance. J. High Speed Networks 15(3): 275-289 (2006)
47EEJedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong: Minos: Architectural support for protecting control data. TACO 3(4): 359-389 (2006)
2005
46EEJedidiah R. Crandall, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong: On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. ACM Conference on Computer and Communications Security 2005: 235-248
45EESeung-Sun Hong, Fiona Wong, Shyhtsun Felix Wu, Bjorn Lilja, Tony Y. Yohansson, Henric Johnson, Ame Nelsson: TCPtransform: Property-Oriented TCP Traffic Transformation. DIMVA 2005: 222-240
44EEJedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong: Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. DIMVA 2005: 32-50
43EEKe Zhang, Soon Tee Teoh, Shih-Ming Tseng, Rattapon Limprasittiporn, Kwan-Liu Ma, Shyhtsun Felix Wu, Chen-Nee Chuah: Performing BGP Experiments on a Semi-realistic Internet Testbed Environment. ICDCS Workshops 2005: 130-136
42EESeung-Sun Hong, Shyhtsun Felix Wu: On Interactive Internet Traffic Replay. RAID 2005: 247-264
41 Wayne Huang, J. L. Cong, Chien-Long Wu, Fan Zhao, Shyhtsun Felix Wu: Design, Implementation, and Evaluation of "FRiTrace". SEC 2005: 343-358
40EEKihun Hong, Souhwan Jung, Shyhtsun Felix Wu: A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. WISA 2005: 96-107
2004
39EEGregory L. Wittel, Shyhtsun Felix Wu: On Attacking Statistical Spam Filters. CEAS 2004
38EESouhwan Jung, Fan Zhao, Shyhtsun Felix Wu, HyunGon Kim: Threat Analysis on NEtwork MObility (NEMO). ICICS 2004: 331-342
37EEKe Zhang, Amy Yen, Xiaoliang Zhao, Daniel Massey, Shyhtsun Felix Wu, Lixia Zhang: On Detection of Anomalous Routing Dynamics in BGP. NETWORKING 2004: 259-270
36EEArchana Pasupulati, Jason Coit, Karl N. Levitt, Shyhtsun Felix Wu, S. H. Li, J. C. Kuo, K. P. Fan: Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. NOMS (1) 2004: 235-248
35EEYanyan Yang, Charles U. Martel, Shyhtsun Felix Wu: On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies. NOMS (1) 2004: 277-290
34EEJürgen Schönwälder, Aiko Pras, Shyhtsun Felix Wu, Bert Wijnen, Loris Degioanni: Panel three: Monitoring and controlling networks: Have we lost control of our networks? NOMS (1) 2004: 915
33EESoon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, Shyhtsun Felix Wu: Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP. VizSEC 2004: 35-44
32EERuzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004)
31EESoon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, T. J. Jankun-Kelly: Detecting Flaws and Intruders with Visual Data Analysis. IEEE Computer Graphics and Applications 24(5): 27-35 (2004)
2003
30EEXiaoliang Zhao, Daniel Massey, Shyhtsun Felix Wu, Mohit Lad, Dan Pei, Lan Wang, Lixia Zhang: Understanding BGP Behavior through a Study of DoD Prefixes. DISCEX (1) 2003: 214-225
29EEDan Pei, Lan Wang, Daniel Massey, Shyhtsun Felix Wu, Lixia Zhang: A Study of Packet Delivery Performance during Routing Convergence. DSN 2003: 183-192
28EESoon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Daniel Massey, Xiaoliang Zhao, Dan Pei, Lan Wang, Lixia Zhang, Randy Bush: Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events. DSOM 2003: 155-168
27EELan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang: Protecting BGP Routes to Top Level DNS Servers. ICDCS 2003: 322-331
26 Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu: A Visual Exploration Process for the Analysis of Internet Routing Data. IEEE Visualization 2003: 523-530
25 Yanyan Yang, Zhi (Judy) Fu, Shyhtsun Felix Wu: BANDS: An Inter-domain Internet Security Policy Management System for IPSec/VPN. Integrated Network Management 2003: 231-244
24EEHe Huang, Shyhtsun Felix Wu: An approach to certificate path discovery in mobile Ad Hoc networks. SASN 2003: 41-52
2002
23EEXiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang: Detection of Invalid Routing Announcement in the Internet. DSN 2002: 59-68
22EEXinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu: Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. ESORICS 2002: 244-263
21EESoon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Xiaoliang Zhao: Case Study: Interactive Visualization for Internet Security. IEEE Visualization 2002
20EEDan Pei, Xiaoliang Zhao, Lan Wang, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang: Improving BGP Convergence Through Consistency Assertions. INFOCOM 2002
19EELan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang: Observation and analysis of BGP behavior under stress. Internet Measurement Workshop 2002: 183-195
2001
18EEXiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang: An analysis of BGP multiple origin AS (MOAS) conflicts. Internet Measurement Workshop 2001: 31-35
17EEZhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fengmin Gong, Ilia Baldine, Chong Xu: IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution. POLICY 2001: 39-56
16 Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill: Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. SEC 2001: 369-384
15EEHo-Yen Chang, Shyhtsun Felix Wu, Y. Frank Jou: Real-time protocol analysis for detecting link-state routing protocol attacks. ACM Trans. Inf. Syst. Secur. 4(1): 1-36 (2001)
2000
14 Hervé Debar, Ludovic Mé, Shyhtsun Felix Wu: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings Springer 2000
13EEXiaobing Zhang, Shyhtsun Felix Wu, Zhi Fu, Tsung-Li Wu: Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It. ICNP 2000: 263-272
12EEZhi Fu, He Huang, Tsung-Li Wu, Shyhtsun Felix Wu, Fengmin Gong, Chong Xu, Ilia Baldine: ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol. NOMS 2000: 565-578
11EEJim Yuill, Shyhtsun Felix Wu, J. Settle, Fengmin Gong, R. Forno, Ming-Yuh Huang, J. Asbery: Intrusion-detection for incident-response, using a military battlefield-intelligence process. Computer Networks 34(4): 671-697 (2000)
1999
10EEJim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Yuh Huang: Intrusion Detection for an On-Going Attack. Recent Advances in Intrusion Detection 1999
1998
9EEFeiyi Wang, Shyhtsun Felix Wu: On the Vulnerabilities and Protection of OSPF Routing Protocol. ICCCN 1998: 148-152
8EED. Qu, Brain Vetter, Feiyi Wang, R. Narayan, Shyhtsun Felix Wu, Y. Frank Jou, Fengmin Gong, C. Sargor: Statistical Anomaly Detection for Link-State Routing Protocols. ICNP 1998: 62-70
1997
7EEBrain Vetter, Feiyi Wang, Shyhtsun Felix Wu: An experimental study of insider attacks for OSPF routing protocol. ICNP 1997: 293-300
6EEJatin N. Hansoty, Mladen A. Vouk, Shyhtsun Felix Wu: LAVA: Secure Delegation of Mobile Applets: Design, Implementation, and Applications. WETICE 1997: 242-247
1996
5EEShyhtsun Felix Wu: Sleepy Network-Layer Authentication Service for IPSEC. ESORICS 1996: 146-159
1991
4EESteven S. Popovich, Shyhtsun Felix Wu, Gail E. Kaiser: An object-based approach to implementing distributed concurrency control. ICDCS 1991: 65-72
3 Steven S. Popovich, Gail E. Kaiser, Shyhtsun Felix Wu: MELDing transactions and objects. OOPS Messenger 2(2): 94-98 (1991)
1990
2EEGail E. Kaiser, Wenwey Hseush, Steven S. Popovich, Shyhtsun Felix Wu: Multiple concurrency control policies in an object-oriented programming system. SPDP 1990: 623-626
1989
1 Gail E. Kaiser, Steven S. Popovich, Wenwey Hseush, Shyhtsun Felix Wu: MELDing Multiple Granularities of Parallelism. ECOOP 1989: 147-166

Coauthor Index

1John Mark Agosta [61]
2J. Asbery [11]
3Ruzena Bajcsy [32]
4Ilia Baldine [12] [17]
5Terry Benzel [32]
6Matt Bishop [32]
7Robert Braden [32]
8John Brevik [66]
9Carla E. Brodley [32]
10Randy Bush [19] [27] [28]
11Ho-Yen Chang [15]
12Senthilkumar G. Cheetancheri [61]
13Frederic T. Chong [44] [46] [47] [52] [53] [62] [66]
14Chen-Nee Chuah [43]
15Jason Coit [36]
16J. L. Cong [41]
17Jedidiah R. Crandall [44] [46] [47] [52] [53] [62] [63] [66]
18Dimitri do B. DeFigueiredo [54]
19Hervé Debar [14]
20Loris Degioanni [34]
21Sonia Fahmy [32]
22K. P. Fan [36]
23Markus Fiedler [50] [51]
24Sally Floyd [32]
25R. Forno [11]
26Zhi Fu [12] [13] [17]
27Zhi (Judy) Fu [25] [48]
28Fengmin Gong [8] [10] [11] [12] [17]
29Jatin N. Hansoty [6]
30W. Hardaker [32]
31Young-Jun Heo [63]
32Kihun Hong [40]
33Seung-Sun Hong [42] [45]
34Wenwey Hseush [1] [2]
35He Huang [12] [17] [24] [49]
36Ming-Yuh Huang [10] [11]
37Wayne Huang [41]
38Lennart Isaksson [51]
39Ryan Iwahashi [63]
40Jong-Soo Jang [63]
41T. J. Jankun-Kelly [31]
42Henric Johnson [45] [50] [51]
43Anthony D. Joseph [32]
44Y. Frank Jou [8] [15]
45Souhwan Jung [38] [40]
46Gail E. Kaiser [1] [2] [3] [4]
47George Kesidis [32]
48HyunGon Kim [38]
49J. C. Kuo [36]
50Mohit Lad [30]
51Karl N. Levitt [32] [36] [60] [61] [64] [65]
52S. H. Li [36]
53Bjorn Lilja [45]
54Rattapon Limprasittiporn [43]
55Robert Lindell [32]
56Peng Liu [32]
57Kung Loh [17]
58Xiaoming Lu [60] [64] [65]
59Kwan-Liu Ma [21] [26] [28] [31] [33] [43] [58]
60Allison Mankin [18] [19] [20] [23] [27]
61Charles U. Martel [35] [48] [57]
62Daniel Massey [18] [19] [20] [23] [27] [28] [29] [30] [37]
63Norman S. Matloff [60] [65]
64Ludovic Mé [14]
65Deep Medhi (D. Medhi) [59]
66David Miller [32]
67Russ Mundy [32]
68R. Narayan [8]
69Ame Nelsson [45]
70Cliford Neuman [32]
71Arne A. Nilsson [50]
72José Marcos S. Nogueira [59]
73Jin-Tae Oh [63]
74Daniela A. S. de Oliveira [52] [53] [62] [63] [66]
75Ron Ostrenga [32]
76Archana Pasupulati [36]
77Vern Paxson [32]
78Dan Pei [18] [19] [20] [23] [27] [28] [29] [30]
79Tom Pfeifer [59]
80Steven S. Popovich [1] [2] [3] [4]
81Phillip A. Porras [32]
82Aiko Pras [34]
83B. Qaisrani [50]
84D. Qu [8]
85Douglas S. Reeves [16] [22]
86Catherine Rosenberg [32]
87Jeff Rowe [61]
88C. Sargor [8]
89Shankar Sastry (Shankar S. Sastry) [32]
90Jürgen Schönwälder [34]
91J. Settle [11]
92Matt Spear [60] [64] [65]
93Daniel F. Sterne [32]
94Zhendong Su [46] [52] [53] [62] [66]
95Soon Tee Teoh [21] [26] [28] [31] [33] [43] [58]
96Shih-Ming Tseng [33] [43] [58]
97J. Doug Tygar (J. D. Tygar) [32]
98V. R. Vemuri [56]
99Balaji Venkatachalam [54]
100Brain Vetter [7] [8]
101Mladen A. Vouk [6]
102Feiyi Wang [7] [8] [9]
103Lan Wang [18] [19] [20] [23] [27] [28] [29] [30]
104Xinyuan Wang [16] [22]
105Gary Wassermann [52] [53] [62] [66]
106Bert Wijnen [34]
107Gregory L. Wittel [39]
108Fiona Wong [45]
109Chien-Long Wu [41]
110Tsung-Li Wu [12] [13]
111Chong Xu [12] [17]
112F. Xue [56]
113Yanyan Yang [25] [35] [48] [57]
114Shaozhi Ye [62] [66]
115Amy Yen [37]
116Tony Y. Yohansson [45]
117S. J. Ben Yoo [56]
118Jim Yuill [10] [11] [16]
119Ke Zhang [33] [37] [43] [55] [58]
120Lixia Zhang [18] [19] [20] [23] [27] [28] [29] [30] [37]
121Xiaobing Zhang [13]
122F. Zhao [56]
123Fan Zhao [38] [41]
124Xiaoliang Zhao [18] [19] [20] [21] [23] [27] [28] [30] [37] [58]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)