2002 conference paper

Inter-packet delay based correlation for tracing encrypted connections through stepping stones

Computer security--ESORICS 2002: 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002: proceedings (Lecture notes in computer science ; 2502), 2502, 244–263. New York: Springer.

By: X. Wang, D. Reeves & S. Wu

Source: NC State University Libraries
Added: August 6, 2018

2001 chapter

IPSec/VPN security policy: Correctness, conflict detection, and resolution

In Policies for distributed systems and networks: International workshop, POLICY 2001, Bristol, UK, January 29-31, 2001: Proceedings (Vol. 1995, pp. 39–56). Berlin; New York: Springer.

By: Z. Fu, S. Wu, H. Huang, K. Loh, F. Gong, I. Baldine, C. Xu

Source: NC State University Libraries
Added: August 6, 2018

chapter

DecIdUouS: decentralized source identification for network-based intrusions

Chang, H. Y., Narayan, R., Saryor, C., Jou, P., Wu, S. F., Vetter, B. M., … Yuill, J. J. In Integrated network management VI: Distributed management for the networked millennium (pp. 701–714). Piscataway, NJ: IEEE Pub.

By: H. Chang, R. Narayan, C. Saryor, P. Jou, S. Wu, B. Vetter, F. Gong, X. Wang, M. Brown, J. Yuill

Source: NC State University Libraries
Added: August 6, 2018