Xinyuan Wang Wang, Z., Jiang, X. X., Cui, W. D., & Wang, X. Y. (2008). Countering persistent kernel rootkits through systematic hook discovery. Recent advances in intrusion detection, raid 2008, 5230, 21–38. Ning, P., Jajodia, S., & Wang, X. Y. S. (2002). Design and implementation of a decentralized prototype system for detecting distributed attacks. COMPUTER COMMUNICATIONS, 25(15), 1374–1391. https://doi.org/10.1016/S0140-3664(02)00039-7 Wang, X. Y., Reeves, D. S., & Wu, S. F. (2002). Inter-packet delay based correlation for tracing encrypted connections through stepping stones. In G. K. D. Gollmann & M. Waidner (Eds.), Computer security--ESORICS 2002: 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002: proceedings (Lecture notes in computer science ; 2502) (Vol. 2502, pp. 244–263). New York: Springer. Chang, H. Y., Narayan, R., Saryor, C., Jou, P., Wu, S. F., Vetter, B. M., … Yuill, J. J. DecIdUouS: decentralized source identification for network-based intrusions. In S. M. M. Sloman & E. Lupu (Eds.), Integrated network management VI: Distributed management for the networked millennium (pp. 701–714). Piscataway, NJ: IEEE Pub.