Xinyuan Wang Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRuishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui Yang, Xuxian Jiang: On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. ASIACCS 2009: 61-69
19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJing Jin, Xinyuan Wang: On the effectiveness of low latency anonymous network in the presence of timing attack. DSN 2009: 429-438
18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace: ReFormat: Automatic Reverse Engineering of Encrypted Messages. ESORICS 2009: 200-215
17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRuishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Farley, Xuxian Jiang: An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems. ISPEC 2009: 59-70
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRyan Farley, Xinyuan Wang: Roving Bugnet: Distributed Surveillance Threat and Mitigation. SEC 2009: 39-50
2008
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang: Countering Persistent Kernel Rootkits through Systematic Hook Discovery. RAID 2008: 21-38
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Ramsbrock, Xinyuan Wang, Xuxian Jiang: A First Step towards Live Botmaster Traceback. RAID 2008: 59-77
2007
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXuxian Jiang, Xinyuan Wang, Dongyan Xu: Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. ACM Conference on Computer and Communications Security 2007: 128-138
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinyuan Wang, Shiping Chen, Sushil Jajodia: Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. IEEE Symposium on Security and Privacy 2007: 116-130
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYoung June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning: Tracing Traffic through Intermediate Hosts that Repacketize Flows. INFOCOM 2007: 634-642
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXuxian Jiang, Xinyuan Wang: "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. RAID 2007: 198-218
2006
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSongqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang: WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. ANCS 2006: 173-182
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShiping Chen, Xinyuan Wang, Sushil Jajodia: On the anonymity and traceability of peer-to-peer VoIP calls. IEEE Network 20(5): 32-37 (2006)
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinyuan Wang: The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. IJSN 1(3/4): 184-197 (2006)
2005
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinyuan Wang, Shiping Chen, Sushil Jajodia: Tracking anonymous peer-to-peer VoIP calls on the internet. ACM Conference on Computer and Communications Security 2005: 81-91
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang: Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. ICDCS Workshops 2005: 107-113
2004
4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinyuan Wang: The loop fallacy and serialization in tracing intrusion connections through stepping stones. SAC 2004: 404-411
2003
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinyuan Wang, Douglas S. Reeves: Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. ACM Conference on Computer and Communications Security 2003: 20-29
2002
2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu: Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. ESORICS 2002: 244-263
2001
1no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill: Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. SEC 2001: 369-384

Coauthor Index

1Shiping Chen [6] [8] [12]
2Songqing Chen [9]
3Weidong Cui [15] [18]
4Ryan Farley [16] [17] [20]
5Mike Grace [18]
6Sushil Jajodia [6] [8] [12]
7Xuxian Jiang [10] [13] [14] [15] [17] [18] [20]
8Jing Jin [19]
9Lei Liu [9]
10Peng Ning [5] [11]
11Young Hee Park [11]
12Pai Peng [5]
13Young June Pyun [11]
14Daniel Ramsbrock [14]
15Douglas S. Reeves [1] [2] [3] [5] [11]
16Zhi Wang [15] [18]
17Shyhtsun Felix Wu [1] [2]
18Dongyan Xu [13]
19Xiaohui Yang [17] [20]
20Jim Yuill [1]
21Ruishan Zhang [17] [20]
22Xinwen Zhang [9]

Copyright © Sun Mar 14 22:39:24 2010 by Michael Ley (ley@uni-trier.de)