Carol Fung
Titre
Citée par
Citée par
Année
Dirichlet-based trust management for effective collaborative intrusion detection networks
CJ Fung, J Zhang, I Aib, R Boutaba
IEEE Transactions on Network and Service Management 8 (2), 79-91, 2011
942011
Trust management for host-based collaborative intrusion detection
CJ Fung, O Baysal, J Zhang, I Aib, R Boutaba
International Workshop on Distributed Systems: Operations and Management …, 2008
832008
Robust and scalable trust management for collaborative intrusion detection
CJ Fung, J Zhang, I Aib, R Boutaba
2009 IFIP/IEEE International Symposium on Integrated Network Management, 33-40, 2009
782009
A survey on security in network functions virtualization
W Yang, C Fung
2016 IEEE NetSoft Conference and Workshops (NetSoft), 15-19, 2016
712016
FlowRanger: A request prioritizing algorithm for controller DoS attacks in Software Defined Networks
L Wei, C Fung
2015 IEEE International Conference on Communications (ICC), 5254-5259, 2015
702015
GUIDEX: A game-theoretic incentive-based mechanism for intrusion detection networks
Q Zhu, C Fung, R Boutaba, T Basar
IEEE Journal on Selected Areas in Communications 30 (11), 2220-2230, 2012
682012
A Survey of Android Security Threats and Defenses.
B Rashidi, CJ Fung
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (3), 3-35, 2015
672015
Flowmon: Detecting malicious switches in software-defined networks
A Kamisiński, C Fung
Proceedings of the 2015 Workshop on Automated Decision Making for Active …, 2015
542015
A game-theoretical approach to incentive design in collaborative intrusion detection networks
Q Zhu, C Fung, R Boutaba, T Basar
2009 International Conference on Game Theory for Networks, 384-392, 2009
472009
Vfence: A defense against distributed denial of service attacks using network function virtualization
AHM Jakaria, W Yang, B Rashidi, C Fung, MA Rahman
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
452016
Vguard: A distributed denial of service attack mitigation method using network function virtualization
CJ Fung, B McCormick
2015 11th International Conference on Network and Service Management (CNSM …, 2015
422015
Design and management of collaborative intrusion detection networks
CJ Fung, R Boutaba
2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013
422013
Collaborative Intrusion Detection Networks and Insider Attacks.
CJ Fung
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 63-74, 2011
422011
Bayesian decision aggregation in collaborative intrusion detection networks
CJ Fung, Q Zhu, R Boutaba, T Başar
2010 IEEE Network Operations and Management Symposium-NOMS 2010, 349-356, 2010
422010
A collaborative ddos defence framework using network function virtualization
B Rashidi, C Fung, E Bertino
IEEE Transactions on Information Forensics and Security 12 (10), 2483-2497, 2017
402017
MAC Layer Security of 802.15.4-Compliant Networks
VB Mišić, J Fung, J Mišić
International Workshop on Wireless and Sensor Network Security (WSNS’05 …, 2005
36*2005
Android resource usage risk assessment using hidden Markov model and online learning
B Rashidi, C Fung, E Bertino
Computers & Security 65, 90-107, 2017
322017
Facid: A trust-based collaborative decision framework for intrusion detection networks
CJ Fung, Q Zhu
Ad Hoc Networks 53, 17-31, 2016
322016
Dude, ask the experts!: Android resource access permission recommendation with RecDroid
B Rashidi, C Fung, T Vu
2015 IFIP/IEEE international symposium on integrated network management (IM …, 2015
322015
Recdroid: A resource access permission control portal and recommendation service for smartphone users
B Rashidi, C Fung, T Vu
Proceedings of the ACM MobiCom workshop on Security and privacy in mobile …, 2014
312014
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20