Xun Wang

Affiliations:
  • Cisco Systems Inc., San Jose, CA, USA
  • Ohio State University, Department of Computer Science and Engineering, Columbus, OH, USA (PhD 2007)


According to our database1, Xun Wang authored at least 18 papers between 2004 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2011
Modeling and Detection of Camouflaging Worm.
IEEE Trans. Dependable Secur. Comput., 2011

On detecting active worms with varying scan rate.
Comput. Commun., 2011

2009
An Invisible Localization Attack to Internet Threat Monitors.
IEEE Trans. Parallel Distributed Syst., 2009

Sensor network configuration under physical attacks.
Int. J. Ad Hoc Ubiquitous Comput., 2009

2008
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense.
Comput. Commun., 2008

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Detecting worms via mining dynamic program execution.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

2006
On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks.
IEEE Trans. Parallel Distributed Syst., 2006

Policy-driven physical attacks in sensor networks: modeling and measurement.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Effective Detection of Active Worms with Varying Scan Rate.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

On Detecting Camouflaging Worm.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Defending against search-based physical attacks in sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Search-based physical attacks in sensor networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

Lifetime optimization of sensor networks under physical attacks.
Proceedings of IEEE International Conference on Communications, 2005

On defending peer-to-peer system-based active worm attacks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Resilience of Structured Peer-to-Peer Systems.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

2004
Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004


  Loading...