Measuring message propagation and social influence on Twitter. com S Ye, SF Wu Social Informatics: Second International Conference, SocInfo 2010, Laxenburg …, 2010 | 434 | 2010 |
Visual analytics PC Wong, J Thomas IEEE Computer Graphics and Applications 24 (05), 20-21, 2004 | 407 | 2004 |
On Attacking Statistical Spam Filters. GL Wittel, SF Wu CEAS, 2004 | 315 | 2004 |
On design and evaluation of Intention-Driven ICMP Traceback A Mankin, D Massey, CL Wu, SF Wu, L Zhang Computer Communications and Networks, 2001. Proceedings. Tenth International …, 2001 | 309 | 2001 |
An analysis of BGP multiple origin AS (MOAS) conflicts X Zhao, D Pei, L Wang, D Massey, A Mankin, SF Wu, L Zhang Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, 31-35, 2001 | 281 | 2001 |
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits JR Crandall, Z Su, SF Wu, FT Chong Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 257 | 2005 |
Observation and analysis of BGP behavior under stress L Wang, X Zhao, D Pei, R Bush, D Massey, A Mankin, SF Wu, L Zhang Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 183-195, 2002 | 232 | 2002 |
Inter-packet delay based correlation for tracing encrypted connections through stepping stones X Wang, DS Reeves, SF Wu Computer Security—ESORICS 2002: 7th European Symposium on Research in …, 2002 | 230 | 2002 |
Sleepy watermark tracing: An active network-based intrusion response framework X Wang, DS Reeves, SF Wu, J Yuill Trusted Information: The New Decade Challenge 16, 369-384, 2001 | 226 | 2001 |
Analysis of user keyword similarity in online social networks P Bhattacharyya, A Garg, SF Wu Social network analysis and mining, 1-16, 2010 | 190* | 2010 |
Improving BGP convergence through consistency assertions D Pei, X Zhao, L Wang, D Massey, A Mankin, SF Wu, L Zhang Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002 | 184 | 2002 |
IPSec/VPN security policy: Correctness, conflict detection, and resolution Z Fu, SF Wu, H Huang, K Loh, F Gong, I Baldine, C Xu International Workshop on Policies for Distributed Systems and Networks, 39-56, 2001 | 184 | 2001 |
Crawling online social graphs S Ye, J Lang, F Wu 2010 12th International Asia-Pacific Web Conference, 236-242, 2010 | 176 | 2010 |
Selective encryption and watermarking of MPEG video TL Wu, SF Wu International Conference on Image Science, Systems, and Technology, CISST 97 …, 1997 | 146 | 1997 |
Detection of invalid routing announcement in the Internet X Zhao, D Pei, L Wang, D Massey, A Mankin, SF Wu, L Zhang Proceedings International Conference on Dependable Systems and Networks, 59-68, 2002 | 133 | 2002 |
Temporal search: Detecting hidden malware timebombs with virtual machines JR Crandall, G Wassermann, DAS De Oliveira, Z Su, SF Wu, FT Chong ACM SIGOPS Operating Systems Review 40 (5), 25-36, 2006 | 119 | 2006 |
Design and implementation of a scalable intrusion detection system for the protection of network infrastructure YF Jou, F Gong, C Sargor, X Wu, SF Wu, HC Chang, F Wang Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 108 | 2000 |
Architecture design of a scalable intrusion detection system for the emerging network infrastructure YF Jou, F Gong, C Sargor, SF Wu, WR Cleaveland North Carolina State University Technical Report CDRL A005, 1997 | 107 | 1997 |
Case study: Interactive visualization for internet security ST Teoh, KL Ma, SF Wu, X Zhao IEEE Visualization, 2002. VIS 2002., 505-508, 2002 | 102 | 2002 |
Cyber defense technology networking and evaluation R Bajcsy, T Benzel, M Bishop, B Braden, C Brodley, S Fahmy, S Floyd, ... Communications of the ACM 47 (3), 58-61, 2004 | 94 | 2004 |