팔로우
Ping Wang
제목
인용
인용
연도
An Advanced Hybrid Peer-to-Peer Botnet
P Wang, S Sparks, CC Zou
1st USENIX Workshop on Hot Topics in Understanding Botnets (HotBots '07), 2007
5602007
Honeypot detection in advanced botnet attacks
P Wang, L Wu, R Cunningham, CC Zou
International Journal of Information and Computer Security 4 (1), 30-51, 2010
1602010
A Systematic Study on Peer-to-Peer Botnets
P Wang, L Wu, B Aslam, CC Zou
Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th …, 2009
1412009
Peer-to-Peer Botnets: The Next Generation of Botnet Attacks
P Wang, B Aslam, CC Zou
Handbook of Information and Communication Security, 335-350, 2010
722010
Peer-to-Peer Botnets
P Wang, B Aslam, CC Zou
Handbook of Information and Communication Security, 335-350, 2010
722010
Extension of internet access to VANET via satellite receive–only terminals
B Aslam, P Wang, CC Zou
International Journal of Ad Hoc and Ubiquitous Computing 14 (3), 172-190, 2013
292013
Analysis of Peer-to-Peer botnet attacks and defenses
P Wang, L Wu, B Aslam, CC Zou
Propagation phenomena in real world networks, 183-214, 2015
222015
The Next Generation of Botnet Attacks, Jan. 2010
P Wang, B Aslann, CC Zou, PP Botnets
Year, 2010
222010
An Economical, Deployable and Secure Vehicular Ad Hoc Network
B Aslam, P Wang, C Zou
Military Communications Conference, 2008. MILCOM 2008. IEEE, 1-7, 2008
202008
Pervasive Internet Access by Vehicles through Satellite Receive-only Terminals
B Aslam, P Wang, CC Zou
Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th …, 2009
102009
An economical, deployable and secure architecture for the initial deployment stage of vehicular ad-hoc network
B Aslam, P Wang, CC Zou
Secure System Design and Trustable Computing, 487-519, 2016
42016
DEPENDABLE AND SECURE COMPUTING
P Wang, S Sparks, CC Zou, H Boudali, P Crouzen, M Stoelinga, ...
2010
2013 2nd National Conference on Information Assurance (NCIA) Technical Program Committee
A Masood, A Qayyum, N Altaf, A Aakif, A Ghafoor, C Zou, D Turgut, ...
A Reputation-Based Malicious Activity Detection System in Peer-to-Peer Network
S Mondesire, P Wang, G Hadlett
DCNET program committee
B Aslam, B Bellalta, C Bouras, C Callegari, F Cerdan, P Champrasert, ...
Structural System Call Diagram and Its Application in Malicious Software Detection
J Dai, R Guha, P Wang
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–16