Detecting SYN flooding attacks H Wang, D Zhang, KG Shin Proceedings. Twenty-first annual joint conference of the IEEE computer and …, 2002 | 1023 | 2002 |
Detecting automation of twitter accounts: Are you a human, bot, or cyborg? Z Chu, S Gianvecchio, H Wang, S Jajodia IEEE Transactions on dependable and secure computing 9 (6), 811-824, 2012 | 932 | 2012 |
Who is tweeting on Twitter: human, bot, or cyborg? Z Chu, S Gianvecchio, H Wang, S Jajodia Proceedings of the 26th annual computer security applications conference, 21-30, 2010 | 772 | 2010 |
Hop-count filtering: an effective defense against spoofed DDoS traffic C Jin, H Wang, KG Shin Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 765 | 2003 |
Defense against spoofed IP traffic using hop-count filtering H Wang, C Jin, KG Shin IEEE/ACM Transactions on networking 15 (1), 40-53, 2007 | 481 | 2007 |
Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud Z Wu, Z Xu, H Wang IEEE/ACM Transactions on Networking 23 (2), 603-615, 2014 | 466 | 2014 |
You are how you touch: User verification on smartphones via tapping behaviors N Zheng, K Bai, H Huang, H Wang 2014 IEEE 22nd International Conference on Network Protocols, 221-232, 2014 | 402 | 2014 |
Change-point monitoring for the detection of DoS attacks H Wang, D Zhang, KG Shin IEEE Transactions on dependable and secure computing 1 (4), 193-208, 2004 | 359 | 2004 |
An efficient user verification system via mouse movements N Zheng, A Paloski, H Wang Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 339 | 2011 |
Detecting covert timing channels: an entropy-based approach S Gianvecchio, H Wang Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 262 | 2007 |
Enhancing cache robustness for content-centric networking M Xie, I Widjaja, H Wang 2012 Proceedings IEEE INFOCOM, 2426-2434, 2012 | 219 | 2012 |
Detecting social spam campaigns on twitter Z Chu, I Widjaja, H Wang Applied Cryptography and Network Security: 10th International Conference …, 2012 | 215 | 2012 |
Detecting VoIP floods using the Hellinger distance H Sengar, H Wang, D Wijesekera, S Jajodia IEEE transactions on parallel and distributed systems 19 (6), 794-805, 2008 | 212 | 2008 |
Model-based covert timing channels: Automated modeling and evasion S Gianvecchio, H Wang, D Wijesekera, S Jajodia Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 209 | 2008 |
Acquisitional rule-based engine for discovering {Internet-of-Things} devices X Feng, Q Li, H Wang, L Sun 27th USENIX security symposium (USENIX Security 18), 327-341, 2018 | 179 | 2018 |
High fidelity data reduction for big data security dependency analyses Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 173 | 2016 |
An entropy-based approach to detecting covert timing channels S Gianvecchio, H Wang IEEE Transactions on Dependable and Secure Computing 8 (6), 785-797, 2010 | 166 | 2010 |
Characterizing insecure JavaScript practices on the web C Yue, H Wang Proceedings of the 18th international conference on World wide web, 961-970, 2009 | 166 | 2009 |
Containerleaks: Emerging security threats of information leakages in container clouds X Gao, Z Gu, M Kayaalp, D Pendarakis, H Wang 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 165 | 2017 |
VoIP intrusion detection through interacting protocol state machines H Sengar, D Wijesekera, H Wang, S Jajodia International Conference on Dependable Systems and Networks (DSN'06), 393-402, 2006 | 150 | 2006 |