Rocky Chang
TitoloCitata daAnno
Defending against flooding-based distributed denial-of-service attacks: a tutorial
RKC Chang
IEEE communications magazine 40 (10), 42-51, 2002
6922002
Measuring the quality of experience of HTTP video streaming.
RKP Mok, EWW Chan, RKC Chang
Integrated Network Management, 485-492, 2011
4642011
QDASH: a QoE-aware DASH system
RKP Mok, X Luo, EWW Chan, RKC Chang
Proceedings of the 3rd Multimedia Systems Conference, 11-22, 2012
3862012
On a New Class of Pulsing Denial-of-Service Attacks and the Defense.
X Luo, RKC Chang
NDSS, 2005
1982005
Inferring the QoE of HTTP video streaming from user-viewing activities
RKP Mok, EWW Chan, X Luo, RKC Chang
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack …, 2011
1312011
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci
NDSS 11, 2011
1292011
TCP covert timing channels: Design and detection
X Luo, EWW Chan, RKC Chang
2008 IEEE International Conference on Dependable Systems and Networks With …, 2008
692008
Engineering of a global defense infrastructure for DDoS attacks
KKK Wan, RKC Chang
Proceedings 10th IEEE International Conference on Networks (ICON 2002 …, 2002
542002
Inbound traffic engineering for multihomed ASs using AS path prepending
RKC Chang, M Lo
IEEE network 19 (2), 18-25, 2005
492005
Anomaly detection of network traffic based on wavelet packet
J Gao, G Hu, X Yao, RKC Chang
2006 Asia-Pacific Conference on Communications, 1-5, 2006
482006
Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring.
X Luo, EWW Chan, RKC Chang
USENIX Annual Technical Conference, 2009
462009
Centralized PSM: an AP-centric power saving mode for 802.11 infrastructure networks
Y Xie, X Luo, RKC Chang
2009 IEEE Sarnoff Symposium, 1-5, 2009
422009
Modeling the vulnerability of feedback-control based internet services to low-rate DoS attacks
Y Tang, X Luo, Q Hui, RKC Chang
IEEE transactions on information forensics and security 9 (3), 339-353, 2013
412013
Detecting pulsing denial-of-service attacks with nondeterministic attack intervals
X Luo, EWW Chan, RKC Chang
EURASIP Journal on Advances in Signal Processing 2009, 8, 2009
382009
Cloak: A ten-fold way for reliable covert communications
X Luo, EWW Chan, RKC Chang
European Symposium on Research in Computer Security, 283-298, 2007
382007
Exposing invisible timing-based traffic watermarks with BACKLIT
X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
362011
Teaching computer networking with the help of personal computer networks
RKC Chang
ACM SIGCSE Bulletin 36 (3), 208-212, 2004
342004
Dimensionality reduction for denial of service detection problems using RBFNN output sensitivity
WWY Ng, RKC Chang, DS Yeung
Proceedings of the 2003 International Conference on Machine Learning and …, 2003
342003
Vanguard: a new detection scheme for a class of TCP-targeted denial-of-service attacks
X Luo, EWW Chan, RKC Chang
2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 507-518, 2006
322006
Performance analysis of TCP/AQM under denial-of-service attacks
X Luo, RKC Chang, EWW Chan
13th IEEE International Symposium on Modeling, Analysis, and Simulation of …, 2005
312005
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20