Delving into internet DDoS attacks by botnets: characterization and analysis A Wang, W Chang, S Chen, A Mohaisen IEEE/ACM Transactions on Networking 26 (6), 2843-2855, 2018 | 198 | 2018 |
Scotch: Elastically scaling up SDN control-plane using vswitch based overlay A Wang, Y Guo, F Hao, TV Lakshman, S Chen Proceedings of the 10th ACM International on Conference on emerging …, 2014 | 121 | 2014 |
Scale-up of sdn control plane using virtual switch based overlay A Wang, Y Guo, F Hao, TV Lakshman US Patent App. 14/137,047, 2013 | 92 | 2013 |
Software-defined networking enhanced edge computing: A network-centric survey A Wang, Z Zha, Y Guo, S Chen Proceedings of the IEEE 107 (8), 1500-1519, 2019 | 70 | 2019 |
Measuring botnets in the wild: Some new trends W Chang, A Mohaisen, A Wang, S Chen Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 70 | 2015 |
Umon: Flexible and fine grained traffic monitoring in open vswitch A Wang, Y Guo, F Hao, TV Lakshman, S Chen Proceedings of the 11th ACM Conference on Emerging Networking Experiments …, 2015 | 47 | 2015 |
An Adversary-Centric Behavior Modeling of DDoS Attacks A Wang, A Mohaisen, S Chen Distributed Computing Systems (ICDCS), 2017 IEEE 37th International …, 2017 | 38 | 2017 |
Capturing DDoS attack dynamics behind the scenes A Wang, A Mohaisen, W Chang, S Chen International Conference on Detection of Intrusions and Malware, and …, 2015 | 37 | 2015 |
Revealing ddos attack dynamics behind the scenes A Wang, A Mohaisen, W Chang, S Chen Proc. of DIMVA, 2015 | 37* | 2015 |
XLF: A cross-layer framework to secure the internet of things (iot) A Wang, A Mohaisen, S Chen 2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019 | 34 | 2019 |
A Data-Driven Study of DDoS Attacks and Their Dynamics A Wang, W Chang, S Chen, A Mohaisen IEEE Transactions on Dependable and Secure Computing, 2018 | 32 | 2018 |
User-defined flexible traffic monitoring in an SDN switch Y Guo, F Hao, TV Lakshman, A Wang US Patent 9,641,459, 2017 | 31 | 2017 |
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection A Anwar, H Alasmary, J Park, A Wang, S Chen, D Mohaisen International Conference on Information and Communications Security, 443-461, 2020 | 21 | 2020 |
Characterizing botnets-as-a-service W Chang, A Wang, A Mohaisen, S Chen Proceedings of the 2014 ACM conference on SIGCOMM, 585-586, 2014 | 20 | 2014 |
Instrumenting Open vSwitch with Monitoring Capabilities: Designs and Challenges Z Zha, A Wang, Y Guo, D Montgomery, S Chen Proceedings of the Symposium on SDN Research, 16, 2018 | 18 | 2018 |
ML-Pushback: Machine Learning Based Pushback Defense Against DDoS Y Mi, A Wang Proceedings of the 15th International Conference on emerging Networking …, 2019 | 16 | 2019 |
SHELLCORE: Automating Malicious IoT Software Detection Using Shell Commands Representation H Alasmary, A Anwar, A Abusnaina, A Alabduljabbar, M Abuhamad, ... IEEE Internet of Things Journal, 2021 | 15 | 2021 |
Scotch A Wang, Y Guo, F Hao, TV Lakshman, S Chen CoNEXT, 0 | 13 | |
vCPU as a container: towards accurate CPU allocation for VMs L Liu, H Wang, A Wang, M Xiao, Y Cheng, S Chen Proceedings of the 15th ACM SIGPLAN/SIGOPS International Conference on …, 2019 | 12 | 2019 |
BotSifter: An SDN-based Online Bot Detection Framework in Data Centers Z Zha, A Wang, Y Guo, D Montgomery, S Chen 2019 IEEE Conference on Communications and Network Security (CNS), 142-150, 2019 | 10 | 2019 |