关注
Wentao Chang
Wentao Chang
在 google.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Delving into internet DDoS attacks by botnets: characterization and analysis
A Wang, W Chang, S Chen, A Mohaisen
IEEE/ACM Transactions on Networking 26 (6), 2843-2855, 2018
1812018
Sampling-based program locality approximation
Y Zhong, W Chang
Proceedings of the 7th international symposium on Memory management, 91-100, 2008
882008
Measuring botnets in the wild: Some new trends
W Chang, A Mohaisen, A Wang, S Chen
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
662015
Capturing ddos attack dynamics behind the scenes
A Wang, A Mohaisen, W Chang, S Chen
International Conference on Detection of Intrusions and Malware, and …, 2015
352015
CipherXRay: Exposing cryptographic operations and transient secrets from monitored binary execution
X Li, X Wang, W Chang
IEEE transactions on dependable and secure computing 11 (2), 101-114, 2012
322012
A data-driven study of DDoS attacks and their dynamics
A Wang, W Chang, S Chen, A Mohaisen
IEEE Transactions on Dependable and Secure Computing 17 (3), 648-661, 2018
282018
Characterizing botnets-as-a-service
W Chang, A Wang, A Mohaisen, S Chen
Proceedings of the 2014 ACM conference on SIGCOMM, 585-586, 2014
192014
ExtensionGuard: Towards runtime browser extension information leakage detection
W Chang, S Chen
2016 IEEE Conference on Communications and Network Security (CNS), 154-162, 2016
112016
Understanding adversarial strategies from bot recruitment to scheduling
W Chang, A Mohaisen, A Wang, S Chen
Security and Privacy in Communication Networks: 13th International …, 2018
82018
Defeat information leakage from browser extensions via data obfuscation
W Chang, S Chen
Information and Communications Security: 15th International Conference …, 2013
82013
POSTER: How Distributed Are Today's DDoS Attacks?
A Wang, W Chang, A Mohaisen, S Chen
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
72014
Measuring and analyzing trends in recent distributed denial of service attacks
A Wang, A Mohaisen, W Chang, S Chen
Information Security Applications: 17th International Workshop, WISA 2016 …, 2017
42017
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory
A Wang, W Chang, S Chen, A Mohaisen
2018
2014 Index IEEE Transactions on Dependable and Secure Computing Vol. 11
GJ Ahn, D Alhadidi, HMJ Almohri, J Alonso, J Alonso Lopez, P Angin, ...
Jia 510, 523, 0
系统目前无法执行此操作,请稍后再试。
文章 1–14