dblp.uni-trier.dewww.uni-trier.de

Shyhtsun Felix Wu Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
68EEMatt Spear, Xiaoming Lu, Norman S. Matloff, Shyhtsun Felix Wu: Inter-Profile Similarity (IPS): A Method for Semantic Analysis of Online Social Networks. Complex (1) 2009: 320-333
67EEThomas Tran, Kelcey Chan, Shaozhi Ye, Prantik Bhattacharyya, Ankush Garg, Xiaoming Lu, Shyhtsun Felix Wu: Design and Implementation of Davis Social Links OSN Kernel. WASA 2009: 527-540
66EEJedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong: Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. Transactions on Computational Science 4: 244-262 (2009)
2008
65EEXiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu: Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks. ICC 2008: 2309-2316
64EEXiaoming Lu, Matt Spear, Karl N. Levitt, Shyhtsun Felix Wu: iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks. INFOCOM 2008: 968-976
63EERyan Iwahashi, Daniela A. S. de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jin-Tae Oh, Jong-Soo Jang: Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. ISC 2008: 114-130
62EEDaniela A. S. de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shaozhi Ye, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong: Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. NOMS 2008: 121-128
61EESenthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe: Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. RAID 2008: 231-250
60EEXiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu: A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. SECURWARE 2008: 403-411
2007
59 Deep Medhi, José Marcos S. Nogueira, Tom Pfeifer, Shyhtsun Felix Wu: IP Operations and Management, 7th IEEE International Workshop, IPOM 2007, San José, USA, October 31 - November 2, 2007, Proceedings Springer 2007
58EEShih-Ming Tseng, Ke Zhang, Shyhtsun Felix Wu, Kwan-Liu Ma, Soon Tee Teoh, Xiaoliang Zhao: Analysis of BGP Origin AS Changes Among Brazil-Related Autonomous Systems. IPOM 2007: 49-60
57EEYanyan Yang, Charles U. Martel, Shyhtsun Felix Wu: CLID: A general approach to validate security policies in a dynamic network. Integrated Network Management 2007: 1-10
56EEF. Zhao, V. R. Vemuri, Shyhtsun Felix Wu, F. Xue, S. J. Ben Yoo: Interactive Informatics on Internet Infrastructure. Integrated Network Management 2007: 90-99
55EEKe Zhang, Shyhtsun Felix Wu: Filter-Based RFD: Can We Stabilize Network Without Sacrificing Reachability Too Much? Networking 2007: 1200-1203
54EEDimitri do B. DeFigueiredo, Balaji Venkatachalam, Shyhtsun Felix Wu: Bounds on the Performance of P2P Networks Using Tit-for-Tat Strategies. Peer-to-Peer Computing 2007: 11-18
2006
53EEDaniela A. S. de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong: ExecRecorder: VM-based full-system replay for attack analysis and system recovery. ASID 2006: 66-71
52EEJedidiah R. Crandall, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong: Temporal search: detecting hidden malware timebombs with virtual machines. ASPLOS 2006: 25-36
51EEHenric Johnson, Lennart Isaksson, Markus Fiedler, Shyhtsun Felix Wu: A Decision System for Adequate Authentication. ICN/ICONS/MCL 2006: 185
50EEHenric Johnson, B. Qaisrani, Markus Fiedler, Arne A. Nilsson, Shyhtsun Felix Wu: Hierarchical Defense Structure for Mitigating DoS Attacks. ICN/ICONS/MCL 2006: 83
49EEHe Huang, Shyhtsun Felix Wu: An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers. NOMS 2006: 414-423
48EEYanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shyhtsun Felix Wu: IPsec/VPN security policy correctness and assurance. J. High Speed Networks 15(3): 275-289 (2006)
47EEJedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong: Minos: Architectural support for protecting control data. TACO 3(4): 359-389 (2006)
2005
46EEJedidiah R. Crandall, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong: On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. ACM Conference on Computer and Communications Security 2005: 235-248
45EESeung-Sun Hong, Fiona Wong, Shyhtsun Felix Wu, Bjorn Lilja, Tony Y. Yohansson, Henric Johnson, Ame Nelsson: TCPtransform: Property-Oriented TCP Traffic Transformation. DIMVA 2005: 222-240
44EEJedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong: Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. DIMVA 2005: 32-50
43EEKe Zhang, Soon Tee Teoh, Shih-Ming Tseng, Rattapon Limprasittiporn, Kwan-Liu Ma, Shyhtsun Felix Wu, Chen-Nee Chuah: Performing BGP Experiments on a Semi-realistic Internet Testbed Environment. ICDCS Workshops 2005: 130-136
42EESeung-Sun Hong, Shyhtsun Felix Wu: On Interactive Internet Traffic Replay. RAID 2005: 247-264
41 Wayne Huang, J. L. Cong, Chien-Long Wu, Fan Zhao, Shyhtsun Felix Wu: Design, Implementation, and Evaluation of "FRiTrace". SEC 2005: 343-358
40EEKihun Hong, Souhwan Jung, Shyhtsun Felix Wu: A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. WISA 2005: 96-107
2004
39EEGregory L. Wittel, Shyhtsun Felix Wu: On Attacking Statistical Spam Filters. CEAS 2004
38EESouhwan Jung, Fan Zhao, Shyhtsun Felix Wu, HyunGon Kim: Threat Analysis on NEtwork MObility (NEMO). ICICS 2004: 331-342
37EEKe Zhang, Amy Yen, Xiaoliang Zhao, Daniel Massey, Shyhtsun Felix Wu, Lixia Zhang: On Detection of Anomalous Routing Dynamics in BGP. NETWORKING 2004: 259-270
36EEArchana Pasupulati, Jason Coit, Karl N. Levitt, Shyhtsun Felix Wu, S. H. Li, J. C. Kuo, K. P. Fan: Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. NOMS (1) 2004: 235-248
35EEYanyan Yang, Charles U. Martel, Shyhtsun Felix Wu: On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies. NOMS (1) 2004: 277-290
34EEJürgen Schönwälder, Aiko Pras, Shyhtsun Felix Wu, Bert Wijnen, Loris Degioanni: Panel three: Monitoring and controlling networks: Have we lost control of our networks? NOMS (1) 2004: 915
33EESoon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, Shyhtsun Felix Wu: Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP. VizSEC 2004: 35-44
32EERuzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004)
31EESoon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, T. J. Jankun-Kelly: Detecting Flaws and Intruders with Visual Data Analysis. IEEE Computer Graphics and Applications 24(5): 27-35 (2004)
2003
30EEXiaoliang Zhao, Daniel Massey, Shyhtsun Felix Wu, Mohit Lad, Dan Pei, Lan Wang, Lixia Zhang: Understanding BGP Behavior through a Study of DoD Prefixes. DISCEX (1) 2003: 214-225
29EEDan Pei, Lan Wang, Daniel Massey, Shyhtsun Felix Wu, Lixia Zhang: A Study of Packet Delivery Performance during Routing Convergence. DSN 2003: 183-192
28EESoon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Daniel Massey, Xiaoliang Zhao, Dan Pei, Lan Wang, Lixia Zhang, Randy Bush: Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events. DSOM 2003: 155-168
27EELan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang: Protecting BGP Routes to Top Level DNS Servers. ICDCS 2003: 322-331
26 Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu: A Visual Exploration Process for the Analysis of Internet Routing Data. IEEE Visualization 2003: 523-530
25 Yanyan Yang, Zhi (Judy) Fu, Shyhtsun Felix Wu: BANDS: An Inter-domain Internet Security Policy Management System for IPSec/VPN. Integrated Network Management 2003: 231-244
24EEHe Huang, Shyhtsun Felix Wu: An approach to certificate path discovery in mobile Ad Hoc networks. SASN 2003: 41-52
2002
23EEXiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang: Detection of Invalid Routing Announcement in the Internet. DSN 2002: 59-68
22EEXinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu: Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. ESORICS 2002: 244-263
21EESoon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Xiaoliang Zhao: Case Study: Interactive Visualization for Internet Security. IEEE Visualization 2002
20EEDan Pei, Xiaoliang Zhao, Lan Wang, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang: Improving BGP Convergence Through Consistency Assertions. INFOCOM 2002
19EELan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang: Observation and analysis of BGP behavior under stress. Internet Measurement Workshop 2002: 183-195
2001
18EEXiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang: An analysis of BGP multiple origin AS (MOAS) conflicts. Internet Measurement Workshop 2001: 31-35
17EEZhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fengmin Gong, Ilia Baldine, Chong Xu: IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution. POLICY 2001: 39-56
16 Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill: Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. SEC 2001: 369-384
15EEHo-Yen Chang, Shyhtsun Felix Wu, Y. Frank Jou: Real-time protocol analysis for detecting link-state routing protocol attacks. ACM Trans. Inf. Syst. Secur. 4(1): 1-36 (2001)
2000
14 Hervé Debar, Ludovic Mé, Shyhtsun Felix Wu: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings Springer 2000
13EEXiaobing Zhang, Shyhtsun Felix Wu, Zhi Fu, Tsung-Li Wu: Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It. ICNP 2000: 263-272
12EEZhi Fu, He Huang, Tsung-Li Wu, Shyhtsun Felix Wu, Fengmin Gong, Chong Xu, Ilia Baldine: ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol. NOMS 2000: 565-578
11EEJim Yuill, Shyhtsun Felix Wu, J. Settle, Fengmin Gong, R. Forno, Ming-Yuh Huang, J. Asbery: Intrusion-detection for incident-response, using a military battlefield-intelligence process. Computer Networks 34(4): 671-697 (2000)
1999
10EEJim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Yuh Huang: Intrusion Detection for an On-Going Attack. Recent Advances in Intrusion Detection 1999
1998
9EEFeiyi Wang, Shyhtsun Felix Wu: On the Vulnerabilities and Protection of OSPF Routing Protocol. ICCCN 1998: 148-152
8EED. Qu, Brain Vetter, Feiyi Wang, R. Narayan, Shyhtsun Felix Wu, Y. Frank Jou, Fengmin Gong, C. Sargor: Statistical Anomaly Detection for Link-State Routing Protocols. ICNP 1998: 62-70
1997
7EEBrain Vetter, Feiyi Wang, Shyhtsun Felix Wu: An experimental study of insider attacks for OSPF routing protocol. ICNP 1997: 293-300
6EEJatin N. Hansoty, Mladen A. Vouk, Shyhtsun Felix Wu: LAVA: Secure Delegation of Mobile Applets: Design, Implementation, and Applications. WETICE 1997: 242-247
1996
5EEShyhtsun Felix Wu: Sleepy Network-Layer Authentication Service for IPSEC. ESORICS 1996: 146-159
1991
4EESteven S. Popovich, Shyhtsun Felix Wu, Gail E. Kaiser: An object-based approach to implementing distributed concurrency control. ICDCS 1991: 65-72
3 Steven S. Popovich, Gail E. Kaiser, Shyhtsun Felix Wu: MELDing transactions and objects. OOPS Messenger 2(2): 94-98 (1991)
1990
2EEGail E. Kaiser, Wenwey Hseush, Steven S. Popovich, Shyhtsun Felix Wu: Multiple concurrency control policies in an object-oriented programming system. SPDP 1990: 623-626
1989
1 Gail E. Kaiser, Steven S. Popovich, Wenwey Hseush, Shyhtsun Felix Wu: MELDing Multiple Granularities of Parallelism. ECOOP 1989: 147-166

Coauthor Index

1John Mark Agosta [61]
2J. Asbery [11]
3Ruzena Bajcsy [32]
4Ilia Baldine [12] [17]
5Terry Benzel [32]
6Prantik Bhattacharyya [67]
7Matt Bishop [32]
8Robert Braden [32]
9John Brevik [66]
10Carla E. Brodley [32]
11Randy Bush [19] [27] [28]
12Kelcey Chan [67]
13Ho-Yen Chang [15]
14Senthilkumar G. Cheetancheri [61]
15Frederic T. Chong [44] [46] [47] [52] [53] [62] [66]
16Chen-Nee Chuah [43]
17Jason Coit [36]
18J. L. Cong [41]
19Jedidiah R. Crandall [44] [46] [47] [52] [53] [62] [63] [66]
20Dimitri do B. DeFigueiredo [54]
21Hervé Debar [14]
22Loris Degioanni [34]
23Sonia Fahmy [32]
24K. P. Fan [36]
25Markus Fiedler [50] [51]
26Sally Floyd [32]
27R. Forno [11]
28Zhi Fu [12] [13] [17]
29Zhi (Judy) Fu [25] [48]
30Ankush Garg [67]
31Fengmin Gong [8] [10] [11] [12] [17]
32Jatin N. Hansoty [6]
33W. Hardaker [32]
34Young-Jun Heo [63]
35Kihun Hong [40]
36Seung-Sun Hong [42] [45]
37Wenwey Hseush [1] [2]
38He Huang [12] [17] [24] [49]
39Ming-Yuh Huang [10] [11]
40Wayne Huang [41]
41Lennart Isaksson [51]
42Ryan Iwahashi [63]
43Jong-Soo Jang [63]
44T. J. Jankun-Kelly [31]
45Henric Johnson [45] [50] [51]
46Anthony D. Joseph [32]
47Y. Frank Jou [8] [15]
48Souhwan Jung [38] [40]
49Gail E. Kaiser [1] [2] [3] [4]
50George Kesidis [32]
51HyunGon Kim [38]
52J. C. Kuo [36]
53Mohit Lad [30]
54Karl N. Levitt [32] [36] [60] [61] [64] [65]
55S. H. Li [36]
56Bjorn Lilja [45]
57Rattapon Limprasittiporn [43]
58Robert Lindell [32]
59Peng Liu [32]
60Kung Loh [17]
61Xiaoming Lu [60] [64] [65] [67] [68]
62Kwan-Liu Ma [21] [26] [28] [31] [33] [43] [58]
63Allison Mankin [18] [19] [20] [23] [27]
64Charles U. Martel [35] [48] [57]
65Daniel Massey [18] [19] [20] [23] [27] [28] [29] [30] [37]
66Norman S. Matloff [60] [65] [68]
67Ludovic Mé [14]
68Deep Medhi (D. Medhi) [59]
69David Miller [32]
70Russ Mundy [32]
71R. Narayan [8]
72Ame Nelsson [45]
73Cliford Neuman [32]
74Arne A. Nilsson [50]
75José Marcos S. Nogueira [59]
76Jin-Tae Oh [63]
77Daniela A. S. de Oliveira [52] [53] [62] [63] [66]
78Ron Ostrenga [32]
79Archana Pasupulati [36]
80Vern Paxson [32]
81Dan Pei [18] [19] [20] [23] [27] [28] [29] [30]
82Tom Pfeifer [59]
83Steven S. Popovich [1] [2] [3] [4]
84Phillip A. Porras [32]
85Aiko Pras [34]
86B. Qaisrani [50]
87D. Qu [8]
88Douglas S. Reeves [16] [22]
89Catherine Rosenberg [32]
90Jeff Rowe [61]
91C. Sargor [8]
92Shankar Sastry (Shankar S. Sastry) [32]
93Jürgen Schönwälder [34]
94J. Settle [11]
95Matt Spear [60] [64] [65] [68]
96Daniel F. Sterne [32]
97Zhendong Su [46] [52] [53] [62] [66]
98Soon Tee Teoh [21] [26] [28] [31] [33] [43] [58]
99Thomas Tran [67]
100Shih-Ming Tseng [33] [43] [58]
101J. Doug Tygar (J. D. Tygar) [32]
102V. R. Vemuri [56]
103Balaji Venkatachalam [54]
104Brain Vetter [7] [8]
105Mladen A. Vouk [6]
106Feiyi Wang [7] [8] [9]
107Lan Wang [18] [19] [20] [23] [27] [28] [29] [30]
108Xinyuan Wang [16] [22]
109Gary Wassermann [52] [53] [62] [66]
110Bert Wijnen [34]
111Gregory L. Wittel [39]
112Fiona Wong [45]
113Chien-Long Wu [41]
114Tsung-Li Wu [12] [13]
115Chong Xu [12] [17]
116F. Xue [56]
117Yanyan Yang [25] [35] [48] [57]
118Shaozhi Ye [62] [66] [67]
119Amy Yen [37]
120Tony Y. Yohansson [45]
121S. J. Ben Yoo [56]
122Jim Yuill [10] [11] [16]
123Ke Zhang [33] [37] [43] [55] [58]
124Lixia Zhang [18] [19] [20] [23] [27] [28] [29] [30] [37]
125Xiaobing Zhang [13]
126F. Zhao [56]
127Fan Zhao [38] [41]
128Xiaoliang Zhao [18] [19] [20] [21] [23] [27] [28] [30] [37] [58]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)