Delving into internet DDoS attacks by botnets: characterization and analysis A Wang, W Chang, S Chen, A Mohaisen IEEE/ACM Transactions on Networking 26 (6), 2843-2855, 2018 | 181 | 2018 |
Sampling-based program locality approximation Y Zhong, W Chang Proceedings of the 7th international symposium on Memory management, 91-100, 2008 | 88 | 2008 |
Measuring botnets in the wild: Some new trends W Chang, A Mohaisen, A Wang, S Chen Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 66 | 2015 |
Capturing ddos attack dynamics behind the scenes A Wang, A Mohaisen, W Chang, S Chen International Conference on Detection of Intrusions and Malware, and …, 2015 | 35 | 2015 |
CipherXRay: Exposing cryptographic operations and transient secrets from monitored binary execution X Li, X Wang, W Chang IEEE transactions on dependable and secure computing 11 (2), 101-114, 2012 | 32 | 2012 |
A data-driven study of DDoS attacks and their dynamics A Wang, W Chang, S Chen, A Mohaisen IEEE Transactions on Dependable and Secure Computing 17 (3), 648-661, 2018 | 28 | 2018 |
Characterizing botnets-as-a-service W Chang, A Wang, A Mohaisen, S Chen Proceedings of the 2014 ACM conference on SIGCOMM, 585-586, 2014 | 19 | 2014 |
ExtensionGuard: Towards runtime browser extension information leakage detection W Chang, S Chen 2016 IEEE Conference on Communications and Network Security (CNS), 154-162, 2016 | 11 | 2016 |
Understanding adversarial strategies from bot recruitment to scheduling W Chang, A Mohaisen, A Wang, S Chen Security and Privacy in Communication Networks: 13th International …, 2018 | 8 | 2018 |
Defeat information leakage from browser extensions via data obfuscation W Chang, S Chen Information and Communications Security: 15th International Conference …, 2013 | 8 | 2013 |
POSTER: How Distributed Are Today's DDoS Attacks? A Wang, W Chang, A Mohaisen, S Chen Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 7 | 2014 |
Measuring and analyzing trends in recent distributed denial of service attacks A Wang, A Mohaisen, W Chang, S Chen Information Security Applications: 17th International Workshop, WISA 2016 …, 2017 | 4 | 2017 |
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory A Wang, W Chang, S Chen, A Mohaisen | | 2018 |
2014 Index IEEE Transactions on Dependable and Secure Computing Vol. 11 GJ Ahn, D Alhadidi, HMJ Almohri, J Alonso, J Alonso Lopez, P Angin, ... Jia 510, 523, 0 | | |