Junjie Zhang
Junjie Zhang
Email verificata su wright.edu - Home page
Titolo
Citata da
Citata da
Anno
Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
G Gu, R Perdisci, J Zhang, W Lee
13412008
BotSniffer: Detecting botnet command and control channels in network traffic
G Gu, J Zhang, W Lee
10362008
Detecting stealthy P2P botnets using statistical traffic fingerprints
J Zhang, R Perdisci, W Lee, U Sarfraz, X Luo
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
1442011
Arrow: Generating signatures to detect drive-by downloads
J Zhang, C Seifert, JW Stokes, W Lee
Proceedings of the 20th international conference on World wide web, 187-196, 2011
1262011
Building a scalable system for stealthy P2P-botnet detection
J Zhang, R Perdisci, W Lee, X Luo, U Sarfraz
IEEE transactions on information forensics and security 9 (1), 27-38, 2013
972013
Boosting the scalability of botnet detection using adaptive traffic sampling
J Zhang, X Luo, R Perdisci, G Gu, W Lee, N Feamster
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
512011
Allelic variation contributes to bacterial host specificity
M Yue, X Han, L De Masi, C Zhu, X Ma, J Zhang, R Wu, R Schmieder, ...
Nature communications 6 (1), 1-11, 2015
492015
Net-cohort: Detecting and managing vm ensembles in virtualized data centers
L Hu, K Schwan, A Gulati, J Zhang, C Wang
Proceedings of the 9th international conference on Autonomic computing, 3-12, 2012
422012
Exposing invisible timing-based traffic watermarks with BACKLIT
X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
362011
On the secrecy of spread-spectrum flow watermarks
X Luo, J Zhang, R Perdisci, W Lee
European Symposium on Research in Computer Security, 232-248, 2010
332010
Detecting fake anti-virus software distribution webpages
DW Kim, P Yan, J Zhang
Computers & Security 49, 95-106, 2015
322015
An inference attack model for flow table capacity and usage: Exploiting the vulnerability of flow table overflow in software-defined network
J Leng, Y Zhou, J Zhang, C Hu
arXiv preprint arXiv:1504.03095, 2015
302015
ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions
Y Zhou, DW Kim, J Zhang, L Liu, H Jin, H Jin, T Liu
IEEE Access 5, 1990-1999, 2017
192017
Load balancing in IP networks using generalized destination-based multipath routing
J Zhang, K Xi, HJ Chao
IEEE/ACM Transactions on Networking 23 (6), 1959-1969, 2014
182014
Intention and Origination: An Inside Look at Large-Scale Bot Queries.
J Zhang, Y Xie, F Yu, D Soukal, W Lee
Ndss, 2013
182013
Morphing communications of cyber-physical systems towards moving-target defense
Y Li, R Dai, J Zhang
2014 IEEE International Conference on Communications (ICC), 592-598, 2014
172014
DNSRadar: Outsourcing malicious domain detection based on distributed cache-footprints
X Ma, J Zhang, J Tao, J Li, J Tian, X Guan
IEEE Transactions on Information Forensics and Security 9 (11), 1906-1921, 2014
152014
Accurate DNS query characteristics estimation via active probing
X Ma, J Zhang, Z Li, J Li, J Tao, X Guan, JCS Lui, D Towsley
Journal of Network and Computer Applications 47, 72-84, 2015
122015
You are how you query: Deriving behavioral fingerprints from DNS traffic
DW Kim, J Zhang
International Conference on Security and Privacy in Communication Systems …, 2015
92015
Exploiting the vulnerability of flow table overflow in software-defined network: Attack model, evaluation, and defense
Y Zhou, K Chen, J Zhang, J Leng, Y Tang
Security and Communication Networks 2018, 2018
72018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20