The Crossfire Attack MS Kang, SB Lee, VD Gligor IEEE Symposium on Security and Privacy, 127-141, 2013 | 372 | 2013 |
SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks MS Kang, VD Gligor, V Sekar Network and Distributed System Security (NDSS) Symposium, 2016 | 147 | 2016 |
CoDef: Collaborative defense against large-scale link-flooding attacks SB Lee, MS Kang, VD Gligor Proceedings of the ninth ACM conference on Emerging networking experiments …, 2013 | 141 | 2013 |
A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network M Tran, I Choi, GJ Moon, VA Vu, MS Kang Proceedings of IEEE Symposium on Security and Privacy 2020 (IEEE S&P 2020), 2020 | 129 | 2020 |
Adaptive interference-aware multi-channel clustering algorithm in a ZigBee network in the presence of WLAN interference MS Kang, JW Chong, H Hyun, SM Kim, BH Jung, DK Sung 2007 2nd International Symposium on Wireless Pervasive Computing, 2007 | 114 | 2007 |
Obscuro: A bitcoin mixer using trusted execution environments M Tran, L Luu, MS Kang, I Bentov, P Saxena Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 81 | 2018 |
Routing bottlenecks in the internet: Causes, exploits, and countermeasures MS Kang, VD Gligor Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 54 | 2014 |
On the Feasibility of Rerouting-based DDoS Defenses M Tran, MS Kang, HC Hsiao, WH Chiang, SP Tung, YS Wang Proceedings of IEEE Symposium on Security and Privacy 2019 (IEEE S&P 2019), 2019 | 44 | 2019 |
Data transfer method, data transmission apparatus, and communication system in multi-hop relay system YH Jeon, TK Yu, JH Kwun, CH Min, MS Kang, HD Kim, BC Jung, DW Lee US Patent 8,897,698, 2014 | 35 | 2014 |
A pre-whitening scheme in a MIMO-based spectrum-sharing environment MS Kang, BC Jung, DK Sung, W Choi IEEE Communications Letters 12 (11), 831-833, 2008 | 34 | 2008 |
DIDA: Distributed in-network defense architecture against amplified reflection DDoS attacks XZ Khooi, L Csikor, DM Divakaran, MS Kang 2020 6th IEEE Conference on Network Softwarization (NetSoft), 277-281, 2020 | 33 | 2020 |
Practical verifiable in-network filtering for DDoS defense D Gong, M Tran, S Shinde, H Jin, V Sekar, P Saxena, MS Kang 2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019 | 31 | 2019 |
A study on the green cellular network with femtocells D Chee, M suk Kang, H Lee, BC Jung 2011 third international conference on ubiquitous and future networks (ICUFN …, 2011 | 26 | 2011 |
Privacy of DNS-over-HTTPS: Requiem for a Dream? L Csikor, H Singh, MS Kang, DM Divakaran 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 252-271, 2021 | 24 | 2021 |
On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin M Tran, A Shenoi, MS Kang USENIX Security 2021, 2021 | 22 | 2021 |
Ubiquitous wearable computer (UWC)-aided coexistence algorithm in an overlaid network environment of WLAN and ZigBee networks BH Jung, JW Chong, SH Jeong, HY Hwang, SM Kim, MS Kang, DK Sung 2007 2nd International Symposium on Wireless Pervasive Computing, 2007 | 22 | 2007 |
Decentralized intercell interference coordination in uplink cellular networks using adaptive sub-band exclusion MS Kang, BC Jung 2009 IEEE Wireless Communications and Networking Conference, 1-5, 2009 | 19 | 2009 |
A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks N Lakshmanan, N Budhdev, MS Kang, MC Chan, J Han USENIX Security 2021, 2021 | 15 | 2021 |
Tuple space explosion: A denial-of-service attack against a software packet classifier L Csikor, DM Divakaran, MS Kang, A Kőrösi, B Sonkoly, D Haja, ... Proceedings of the 15th International Conference on Emerging Networking …, 2019 | 15 | 2019 |
SurFi: Detecting surveillance camera looping attacks with Wi-Fi channel state information N Lakshmanan, I Bang, MS Kang, J Han, JT Lee Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 14 | 2019 |