Æȷοì
Xinyuan Wang
Xinyuan Wang
Associate Professor of Computer Science, George Mason University
gmu.eduÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Stealthy malware detection and monitoring through VMM-based ¡°out-of-the-box¡± semantic view reconstruction
X Jiang, X Wang, D Xu
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010
9582010
Stealthy malware detection and monitoring through VMM-based ¡°out-of-the-box¡± semantic view reconstruction
X Jiang, X Wang, D Xu
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010
9582010
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
X Wang, DS Reeves
Proceedings of the 10th ACM conference on Computer and communications ¡¦, 2003
3592003
Tracking anonymous peer-to-peer voip calls on the internet
X Wang, S Chen, S Jajodia
Proceedings of the 12th ACM conference on Computer and communications ¡¦, 2005
3362005
Containment of Unknown and Polymorphic Fast Spreading Worms
S Chen, X Wang
US Patent App. 12/042,587, 2008
3322008
Network flow watermarking attack on low-latency anonymous communication systems
X Wang, S Chen, S Jajodia
2007 IEEE Symposium on Security and Privacy (SP'07), 116-130, 2007
3132007
Reformat: Automatic reverse engineering of encrypted messages
Z Wang, X Jiang, W Cui, X Wang, M Grace
Computer Security–ESORICS 2009: 14th European Symposium on Research in ¡¦, 2009
2302009
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
X Wang, DS Reeves, SF Wu
Computer Security—ESORICS 2002: 7th European Symposium on Research in ¡¦, 2002
2302002
Interval centroid based watermark
X Wang, S Chen
US Patent 7,724,782, 2010
2282010
Sleepy watermark tracing: An active network-based intrusion response framework
X Wang, DS Reeves, SF Wu, J Yuill
Trusted Information: The New Decade Challenge 16, 369-384, 2001
2252001
¡°Out-of-the-box¡± monitoring of VM-based high-interaction honeypots
X Jiang, X Wang
International Workshop on Recent Advances in Intrusion Detection, 198-218, 2007
2092007
Tracing traffic through intermediate hosts that repacketize flows
YJ Pyun, YH Park, X Wang, DS Reeves, P Ning
IEEE INFOCOM 2007-26th IEEE International Conference on Computer ¡¦, 2007
1592007
Countering persistent kernel rootkits through systematic hook discovery
Z Wang, X Jiang, W Cui, X Wang
Recent Advances in Intrusion Detection: 11th International Symposium, RAID ¡¦, 2008
1382008
Billing Attacks on SIP-Based VoIP Systems.
R Zhang, X Wang, X Yang, X Jiang
WOOT 7, 1-8, 2007
962007
Deciduous: Decentralized source identification for network-based intrusions
HY Chang, R Narayan, SF Wu, BM Vetter, X Wang, M Brown, JJ Yuill, ...
Integrated Network Management VI. Distributed Management for the Networked ¡¦, 1999
811999
A first step towards live botmaster traceback
D Ramsbrock, X Wang, X Jiang
Recent Advances in Intrusion Detection: 11th International Symposium, RAID ¡¦, 2008
802008
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
R Zhang, X Wang, R Farley, X Yang, X Jiang
Proceedings of the 4th International Symposium on Information, Computer, and ¡¦, 2009
682009
Active timing-based correlation of perturbed traffic flows with chaff packets
P Peng, P Ning, DS Reeves, X Wang
25th IEEE International Conference on Distributed Computing Systems ¡¦, 2005
672005
Robust correlation of encrypted attack traffic through stepping stones by flow watermarking
X Wang, D Reeves
IEEE Transactions on Dependable and Secure Computing 8 (3), 434-449, 2010
642010
Tracing based active intrusion response
X Wang, DS Reeves, SF Wu
Journal of Information Warfare 1 (1), 50-61, 2001
562001
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20