Seuraa
Shyhtsun Felix Wu
Shyhtsun Felix Wu
Vahvistettu sähköpostiosoite verkkotunnuksessa cs.ucdavis.edu - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Measuring message propagation and social influence on Twitter. com
S Ye, SF Wu
Social Informatics: Second International Conference, SocInfo 2010, Laxenburg …, 2010
4262010
Visual analytics
PC Wong, J Thomas
IEEE Computer Graphics and Applications 24 (05), 20-21, 2004
4052004
On Attacking Statistical Spam Filters.
GL Wittel, SF Wu
CEAS, 2004
3202004
An analysis of BGP multiple origin AS (MOAS) conflicts
X Zhao, D Pei, L Wang, D Massey, A Mankin, SF Wu, L Zhang
Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, 31-35, 2001
2812001
On design and evaluation of Intention-Driven ICMP Traceback
A Mankin, D Massey, CL Wu, SF Wu, L Zhang
Computer Communications and Networks, 2001. Proceedings. Tenth International …, 2001
2802001
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
JR Crandall, Z Su, SF Wu, FT Chong
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2572005
Observation and analysis of BGP behavior under stress
L Wang, X Zhao, D Pei, R Bush, D Massey, A Mankin, SF Wu, L Zhang
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 183-195, 2002
2352002
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
X Wang, DS Reeves, SF Wu
Computer Security—ESORICS 2002: 7th European Symposium on Research in …, 2002
2292002
Sleepy watermark tracing: An active network-based intrusion response framework
X Wang, DS Reeves, SF Wu, J Yuill
Trusted Information: The New Decade Challenge 16, 369-384, 2001
2262001
Analysis of user keyword similarity in online social networks
P Bhattacharyya, A Garg, SF Wu
Social network analysis and mining, 1-16, 2010
191*2010
Improving BGP convergence through consistency assertions
D Pei, X Zhao, L Wang, D Massey, A Mankin, SF Wu, L Zhang
Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002
1852002
IPSec/VPN security policy: Correctness, conflict detection, and resolution
Z Fu, SF Wu, H Huang, K Loh, F Gong, I Baldine, C Xu
International Workshop on Policies for Distributed Systems and Networks, 39-56, 2001
1822001
Crawling online social graphs
S Ye, J Lang, F Wu
2010 12th International Asia-Pacific Web Conference, 236-242, 2010
1752010
Selective encryption and watermarking of MPEG video
TL Wu, SF Wu
International Conference on Image Science, Systems, and Technology, CISST 97 …, 1997
1461997
Detection of invalid routing announcement in the Internet
X Zhao, D Pei, L Wang, D Massey, A Mankin, SF Wu, L Zhang
Proceedings International Conference on Dependable Systems and Networks, 59-68, 2002
1302002
Temporal search: Detecting hidden malware timebombs with virtual machines
JR Crandall, G Wassermann, DAS De Oliveira, Z Su, SF Wu, FT Chong
ACM SIGOPS Operating Systems Review 40 (5), 25-36, 2006
1192006
Design and implementation of a scalable intrusion detection system for the protection of network infrastructure
YF Jou, F Gong, C Sargor, X Wu, SF Wu, HC Chang, F Wang
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
1092000
Architecture design of a scalable intrusion detection system for the emerging network infrastructure
YF Jou, F Gong, C Sargor, SF Wu, WR Cleaveland
Technical Report CDRL, 1997
1071997
Case study: Interactive visualization for internet security
ST Teoh, KL Ma, SF Wu, X Zhao
IEEE Visualization, 2002. VIS 2002., 505-508, 2002
1042002
Intrusion-detection for incident-response, using a military battlefield-intelligence process
J Yuill, F Wu, J Settle, F Gong, R Forno, M Huang, J Asbery
Computer Networks 34 (4), 671-697, 2000
96*2000
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20