Seguir
Junjie Zhang
Junjie Zhang
Dirección de correo verificada de wright.edu - Página principal
Título
Citado por
Citado por
Año
Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
G Gu, R Perdisci, J Zhang, W Lee
16652008
BotSniffer: Detecting botnet command and control channels in network traffic
G Gu, J Zhang, W Lee
12852008
Detecting stealthy P2P botnets using statistical traffic fingerprints
J Zhang, R Perdisci, W Lee, U Sarfraz, X Luo
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
1772011
Arrow: Generating signatures to detect drive-by downloads
J Zhang, C Seifert, JW Stokes, W Lee
Proceedings of the 20th international conference on World wide web, 187-196, 2011
1502011
Building a scalable system for stealthy P2P-botnet detection
J Zhang, R Perdisci, W Lee, X Luo, U Sarfraz
IEEE transactions on information forensics and security 9 (1), 27-38, 2013
1312013
Boosting the scalability of botnet detection using adaptive traffic sampling
J Zhang, X Luo, R Perdisci, G Gu, W Lee, N Feamster
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
612011
Exploiting the Vulnerability of Flow Table Overflow in Software‐Defined Network: Attack Model, Evaluation, and Defense
Y Zhou, K Chen, J Zhang, J Leng, Y Tang
Security and Communication Networks 2018 (1), 4760632, 2018
602018
An inference attack model for flow table capacity and usage: Exploiting the vulnerability of flow table overflow in software-defined network
J Leng, Y Zhou, J Zhang, C Hu
arXiv preprint arXiv:1504.03095, 2015
572015
Net-cohort: Detecting and managing vm ensembles in virtualized data centers
L Hu, K Schwan, A Gulati, J Zhang, C Wang
Proceedings of the 9th international conference on Autonomic computing, 3-12, 2012
532012
Detecting fake anti-virus software distribution webpages
DW Kim, P Yan, J Zhang
Computers & Security 49, 95-106, 2015
492015
Exposing invisible timing-based traffic watermarks with BACKLIT
X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
492011
Uchecker: Automatically detecting php-based unrestricted file upload vulnerabilities
J Huang, Y Li, J Zhang, R Dai
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
442019
Analyzing and detecting money-laundering accounts in online social networks
Y Zhou, X Wang, J Zhang, P Zhang, L Liu, H Jin, H Jin
Ieee Network 32 (3), 115-121, 2017
412017
Morphing communications of cyber-physical systems towards moving-target defense
Y Li, R Dai, J Zhang
2014 IEEE international conference on communications (ICC), 592-598, 2014
392014
ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions
Y Zhou, DW Kim, J Zhang, L Liu, H Jin, H Jin, T Liu
IEEE Access 5, 1990-1999, 2017
372017
On the secrecy of spread-spectrum flow watermarks
X Luo, J Zhang, R Perdisci, W Lee
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
372010
DNSRadar: Outsourcing malicious domain detection based on distributed cache-footprints
X Ma, J Zhang, J Tao, J Li, J Tian, X Guan
IEEE Transactions on Information Forensics and Security 9 (11), 1906-1921, 2014
292014
You are how you query: Deriving behavioral fingerprints from DNS traffic
DW Kim, J Zhang
International Conference on Security and Privacy in Communication Systems …, 2015
282015
Intention and Origination: An Inside Look at Large-Scale Bot Queries.
J Zhang, Y Xie, F Yu, D Soukal, W Lee
Ndss, 2013
252013
Ufuzzer: Lightweight detection of php-based unrestricted file upload vulnerabilities via static-fuzzing co-analysis
J Huang, J Zhang, J Liu, C Li, R Dai
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
232021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20