An Advanced Hybrid Peer-to-Peer Botnet P Wang, S Sparks, CC Zou 1st USENIX Workshop on Hot Topics in Understanding Botnets (HotBots '07), 2007 | 560 | 2007 |
Honeypot detection in advanced botnet attacks P Wang, L Wu, R Cunningham, CC Zou International Journal of Information and Computer Security 4 (1), 30-51, 2010 | 160 | 2010 |
A Systematic Study on Peer-to-Peer Botnets P Wang, L Wu, B Aslam, CC Zou Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th …, 2009 | 141 | 2009 |
Peer-to-Peer Botnets: The Next Generation of Botnet Attacks P Wang, B Aslam, CC Zou Handbook of Information and Communication Security, 335-350, 2010 | 72 | 2010 |
Peer-to-Peer Botnets P Wang, B Aslam, CC Zou Handbook of Information and Communication Security, 335-350, 2010 | 72 | 2010 |
Extension of internet access to VANET via satellite receive–only terminals B Aslam, P Wang, CC Zou International Journal of Ad Hoc and Ubiquitous Computing 14 (3), 172-190, 2013 | 29 | 2013 |
Analysis of Peer-to-Peer botnet attacks and defenses P Wang, L Wu, B Aslam, CC Zou Propagation phenomena in real world networks, 183-214, 2015 | 22 | 2015 |
The Next Generation of Botnet Attacks, Jan. 2010 P Wang, B Aslann, CC Zou, PP Botnets Year, 2010 | 22 | 2010 |
An Economical, Deployable and Secure Vehicular Ad Hoc Network B Aslam, P Wang, C Zou Military Communications Conference, 2008. MILCOM 2008. IEEE, 1-7, 2008 | 20 | 2008 |
Pervasive Internet Access by Vehicles through Satellite Receive-only Terminals B Aslam, P Wang, CC Zou Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th …, 2009 | 10 | 2009 |
An economical, deployable and secure architecture for the initial deployment stage of vehicular ad-hoc network B Aslam, P Wang, CC Zou Secure System Design and Trustable Computing, 487-519, 2016 | 4 | 2016 |
DEPENDABLE AND SECURE COMPUTING P Wang, S Sparks, CC Zou, H Boudali, P Crouzen, M Stoelinga, ... | | 2010 |
2013 2nd National Conference on Information Assurance (NCIA) Technical Program Committee A Masood, A Qayyum, N Altaf, A Aakif, A Ghafoor, C Zou, D Turgut, ... | | |
A Reputation-Based Malicious Activity Detection System in Peer-to-Peer Network S Mondesire, P Wang, G Hadlett | | |
DCNET program committee B Aslam, B Bellalta, C Bouras, C Callegari, F Cerdan, P Champrasert, ... | | |
Structural System Call Diagram and Its Application in Malicious Software Detection J Dai, R Guha, P Wang | | |