Follow
Shoufu Luo
Title
Cited by
Cited by
Year
Fingerprinting cryptographic protocols with key exchange using an entropy measure
S Luo, JD Seideman, S Dietrich
2018 IEEE Security and Privacy Workshops (SPW), 170-179, 2018
122018
QuickBCC: Quick and scalable binary vulnerable code clone detection
H Jang, K Yang, G Lee, Y Na, JD Seideman, S Luo, H Lee, S Dietrich
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2021
62021
Methods and apparatus for intrusion prevention using global and local feature extraction contexts
JD Hagen, JE Andersson, S Luo, B Niemczyk, L Zsohar, C Botkin, ...
US Patent 10,728,268, 2020
62020
Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces
P Duessel, S Luo, U Flegel, S Dietrich, M Meier
2020 13th International Conference on Systematic Approaches to Digital …, 2020
42020
Dynamic rate limiting for mitigating distributed denial-of-service attacks
S Luo, J Zhang
US Patent 11,108,813, 2021
22021
Examining customer responses to fake online reviews: the role of suspicion and product knowledge
J Ren, P Ozturk, S Luo
Internetworked World: 15th Workshop on e-Business, WeB 2016, Dublin, Ireland …, 2017
22017
Structural Anomaly Detection
S Luo
City University of New York, 2023
2023
DISTRIBUTION BASED DETECTION OF ABUSIVE REQUESTS
S Luo, Y Lin, S Saluja, R Han
US Patent 11,457,034, 2022
2022
Detection of periodic transmissions for identifying malicious computers
S Luo, JE Andersson, JD Hagen
US Patent 11,063,969, 2021
2021
Methods and apparatus for intrusion prevention using global and local feature extraction contexts
JD Hagen, JE Andersson, S Luo, B Niemczyk, L Zsohar, C Botkin, ...
US Patent 11,044,265, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–10