Rocky Chang
TitoloCitata daAnno
Defending against flooding-based distributed denial-of-service attacks: a tutorial
RKC Chang
IEEE communications magazine 40 (10), 42-51, 2002
Measuring the quality of experience of HTTP video streaming.
RKP Mok, EWW Chan, RKC Chang
Integrated Network Management, 485-492, 2011
QDASH: a QoE-aware DASH system
RKP Mok, X Luo, EWW Chan, RKC Chang
Proceedings of the 3rd Multimedia Systems Conference, 11-22, 2012
On a New Class of Pulsing Denial-of-Service Attacks and the Defense.
X Luo, RKC Chang
NDSS, 2005
Inferring the QoE of HTTP video streaming from user-viewing activities
RKP Mok, EWW Chan, X Luo, RKC Chang
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack …, 2011
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci
NDSS 11, 2011
TCP covert timing channels: Design and detection
X Luo, EWW Chan, RKC Chang
2008 IEEE International Conference on Dependable Systems and Networks With …, 2008
Engineering of a global defense infrastructure for DDoS attacks
KKK Wan, RKC Chang
Proceedings 10th IEEE International Conference on Networks (ICON 2002 …, 2002
Inbound traffic engineering for multihomed ASs using AS path prepending
RKC Chang, M Lo
IEEE network 19 (2), 18-25, 2005
Anomaly detection of network traffic based on wavelet packet
J Gao, G Hu, X Yao, RKC Chang
2006 Asia-Pacific Conference on Communications, 1-5, 2006
Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring.
X Luo, EWW Chan, RKC Chang
USENIX Annual Technical Conference, 2009
Centralized PSM: an AP-centric power saving mode for 802.11 infrastructure networks
Y Xie, X Luo, RKC Chang
2009 IEEE Sarnoff Symposium, 1-5, 2009
Modeling the vulnerability of feedback-control based internet services to low-rate DoS attacks
Y Tang, X Luo, Q Hui, RKC Chang
IEEE transactions on information forensics and security 9 (3), 339-353, 2013
Detecting pulsing denial-of-service attacks with nondeterministic attack intervals
X Luo, EWW Chan, RKC Chang
EURASIP Journal on Advances in Signal Processing 2009, 8, 2009
Cloak: A ten-fold way for reliable covert communications
X Luo, EWW Chan, RKC Chang
European Symposium on Research in Computer Security, 283-298, 2007
Exposing invisible timing-based traffic watermarks with BACKLIT
X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
Teaching computer networking with the help of personal computer networks
RKC Chang
ACM SIGCSE Bulletin 36 (3), 208-212, 2004
Dimensionality reduction for denial of service detection problems using RBFNN output sensitivity
WWY Ng, RKC Chang, DS Yeung
Proceedings of the 2003 International Conference on Machine Learning and …, 2003
Vanguard: a new detection scheme for a class of TCP-targeted denial-of-service attacks
X Luo, EWW Chan, RKC Chang
2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 507-518, 2006
Performance analysis of TCP/AQM under denial-of-service attacks
X Luo, RKC Chang, EWW Chan
13th IEEE International Symposium on Modeling, Analysis, and Simulation of …, 2005
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20