Detecting SYN flooding attacks H Wang, D Zhang, KG Shin Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002 | 950 | 2002 |
Hop-count filtering: an effective defense against spoofed DDoS traffic C Jin, H Wang, KG Shin Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 693 | 2003 |
Detecting automation of twitter accounts: Are you a human, bot, or cyborg? Z Chu, S Gianvecchio, H Wang, S Jajodia IEEE Transactions on dependable and secure computing 9 (6), 811-824, 2012 | 601 | 2012 |
Who is tweeting on Twitter: human, bot, or cyborg? Z Chu, S Gianvecchio, H Wang, S Jajodia Proceedings of the 26th annual computer security applications conference, 21-30, 2010 | 594 | 2010 |
Defense against spoofed IP traffic using hop-count filtering H Wang, C Jin, KG Shin IEEE/ACM Transactions on networking 15 (1), 40-53, 2007 | 424 | 2007 |
Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud Z Wu, Z Xu, H Wang IEEE/ACM Transactions on Networking 23 (2), 603-615, 2014 | 338 | 2014 |
Change-point monitoring for the detection of DoS attacks H Wang, D Zhang, KG Shin IEEE Transactions on dependable and secure computing 1 (4), 193-208, 2004 | 326 | 2004 |
You are how you touch: User verification on smartphones via tapping behaviors N Zheng, K Bai, H Huang, H Wang 2014 IEEE 22nd International Conference on Network Protocols, 221-232, 2014 | 290 | 2014 |
An efficient user verification system via mouse movements N Zheng, A Paloski, H Wang Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 251 | 2011 |
Detecting covert timing channels: an entropy-based approach S Gianvecchio, H Wang Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 239 | 2007 |
Detecting VoIP floods using the Hellinger distance H Sengar, H Wang, D Wijesekera, S Jajodia IEEE transactions on parallel and distributed systems 19 (6), 794-805, 2008 | 194 | 2008 |
Enhancing cache robustness for content-centric networking M Xie, I Widjaja, H Wang 2012 Proceedings IEEE INFOCOM, 2426-2434, 2012 | 171 | 2012 |
Model-based covert timing channels: Automated modeling and evasion S Gianvecchio, H Wang, D Wijesekera, S Jajodia International Workshop on Recent Advances in Intrusion Detection, 211-230, 2008 | 163 | 2008 |
Detecting social spam campaigns on twitter Z Chu, I Widjaja, H Wang International Conference on Applied Cryptography and Network Security, 455-472, 2012 | 158 | 2012 |
Characterizing insecure JavaScript practices on the web C Yue, H Wang Proceedings of the 18th international conference on World wide web, 961-970, 2009 | 137 | 2009 |
VoIP intrusion detection through interacting protocol state machines H Sengar, D Wijesekera, H Wang, S Jajodia International Conference on Dependable Systems and Networks (DSN'06), 393-402, 2006 | 134 | 2006 |
An entropy-based approach to detecting covert timing channels S Gianvecchio, H Wang IEEE Transactions on Dependable and Secure Computing 8 (6), 785-797, 2010 | 121 | 2010 |
BogusBiter: A transparent protection against phishing attacks C Yue, H Wang ACM Transactions on Internet Technology (TOIT) 10 (2), 1-31, 2010 | 121 | 2010 |
Design and analysis of sensing scheduling algorithms under partial coverage for object detection in sensor networks S Ren, Q Li, H Wang, X Chen, X Zhang IEEE Transactions on Parallel and Distributed Systems 18 (3), 334-350, 2007 | 116 | 2007 |
Measurement and Classification of Humans and Bots in Internet Chat. S Gianvecchio, M Xie, Z Wu, H Wang USENIX security symposium, 155-170, 2008 | 111 | 2008 |