@inproceedings{wang_reeves_wu_2002, title={Inter-packet delay based correlation for tracing encrypted connections through stepping stones}, volume={2502}, ISBN={0750306114}, booktitle={Computer security--ESORICS 2002: 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002: proceedings (Lecture notes in computer science ; 2502)}, publisher={New York: Springer}, author={Wang, X. Y. and Reeves, D. S. and Wu, S. F.}, editor={D. Gollmann, G. Karjoth and Waidner, M.Editors}, year={2002}, pages={244–263} } @inbook{fu_wu_huang_loh_gong_baldine_xu_2001, title={IPSec/VPN security policy: Correctness, conflict detection, and resolution}, volume={1995}, ISBN={3540416102}, booktitle={Policies for distributed systems and networks: International workshop, POLICY 2001, Bristol, UK, January 29-31, 2001: Proceedings}, publisher={Berlin; New York: Springer}, author={Fu, Z. and Wu, S. F. and Huang, H. and Loh, K. and Gong, F. M. and Baldine, I. and Xu, C.}, editor={M. Sloman, J. Lobo and Lupu, E. C.Editors}, year={2001}, pages={39–56} } @inbook{chang_narayan_saryor_jou_wu_vetter_gong_wang_brown_yuill, title={DecIdUouS: decentralized source identification for network-based intrusions}, booktitle={Integrated network management VI: Distributed management for the networked millennium}, publisher={Piscataway, NJ: IEEE Pub.}, author={Chang, H. Y. and Narayan, R. and Saryor, C. and Jou, P. and Wu, S. F. and Vetter, B. M. and Gong, F. and Wang, X. and Brown, M. and Yuill, J. J.}, editor={M. Sloman, S. Mazumdar and Lupu, E.Editors}, pages={701–714} }