Works (4)

Updated: July 5th, 2023 16:00

2008 conference paper

Countering persistent kernel rootkits through systematic hook discovery

Recent advances in intrusion detection, raid 2008, 5230, 21–38.

By: Z. Wang, X. Jiang, W. Cui & X. Wang

Source: NC State University Libraries
Added: August 6, 2018

2002 journal article

Design and implementation of a decentralized prototype system for detecting distributed attacks

COMPUTER COMMUNICATIONS, 25(15), 1374–1391.

By: P. Ning*, S. Jajodia & X. Wang

author keywords: decentralized intrusion detection; misuse detection; computer security; network security
Source: Web Of Science
Added: August 6, 2018

2002 conference paper

Inter-packet delay based correlation for tracing encrypted connections through stepping stones

In G. K. D. Gollmann & M. Waidner (Eds.), Computer security--ESORICS 2002: 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002: proceedings (Lecture notes in computer science ; 2502) (Vol. 2502, pp. 244–263). New York: Springer.

By: X. Wang, D. Reeves & S. Wu

Ed(s): G. D. Gollmann & M. Waidner

Source: NC State University Libraries
Added: August 6, 2018

chapter

DecIdUouS: decentralized source identification for network-based intrusions

Chang, H. Y., Narayan, R., Saryor, C., Jou, P., Wu, S. F., Vetter, B. M., … Yuill, J. J. In S. M. M. Sloman & E. Lupu (Eds.), Integrated network management VI: Distributed management for the networked millennium (pp. 701–714). Piscataway, NJ: IEEE Pub.

By: H. Chang, R. Narayan, C. Saryor, P. Jou, S. Wu, B. Vetter, F. Gong, X. Wang, M. Brown, J. Yuill

Ed(s): S. M. Sloman & E. Lupu

Source: NC State University Libraries
Added: August 6, 2018