Steven Cheung
Cím
Hivatkozott rá
Hivatkozott rá
Év
GrIDS-a graph based intrusion detection system for large networks
S Staniford-Chen, S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, ...
Proceedings of the 19th national information systems security conference 1 …, 1996
6901996
Using model-based intrusion detection for SCADA networks
S Cheung, B Dutertre, M Fong, U Lindqvist, K Skinner, A Valdes
Proceedings of the SCADA security scientific symposium 46, 1-12, 2007
3662007
Modeling multistep cyber attacks for scenario recognition
S Cheung, U Lindqvist, MW Fong
Proceedings DARPA Information Survivability Conference And Exposition 1, 284-292, 2003
3192003
Detecting disruptive routers: A distributed network monitoring approach
KA Bradley, S Cheung, N Puketza, B Mukherjee, RA Olsson
IEEE network 12 (5), 50-60, 1998
2641998
Securing the Software-Defined Network Control Layer
P Porras, S Cheung, M Fong, K Skinner, V Yegneswaran
Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS), 2015
2012015
StegoTorus: a camouflage proxy for the Tor anonymity system
Z Weinberg, J Wang, V Yegneswaran, L Briesemeister, S Cheung, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1842012
An efficient message authentication scheme for link state routing
S Cheung
Proceedings 13th Annual Computer Security Applications Conference, 90-98, 1997
1781997
Culture, gender, and response bias: An analysis of responses to the Self-Description Questionnaire
D Watkins, S Cheung
Journal of cross-cultural psychology 26 (5), 490-504, 1995
1601995
Protecting routing infrastructures from denial of service using cooperative intrusion detection
S Cheung, KN Levitt
Proceedings of the 1997 workshop on New security paradigms, 94-106, 1998
1531998
Lightweight key management in wireless sensor networks by leveraging initial trust
B Dutertre, S Cheung, J Levy
Technical Report SRI-SDL-04-02, SRI International, 2004
1482004
The design of GrIDS: A graph-based intrusion detection system
S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, K Levitt, J Rowe, ...
Technical Report CSE-99-2, UC Davis Computer Science Department, 1999
1311999
Communication pattern anomaly detection in process control systems
A Valdes, S Cheung
2009 IEEE Conference on Technologies for Homeland Security, 22-29, 2009
1072009
Automatic analysis of firewall and network intrusion detection system configurations
TE Uribe, S Cheung
Journal of Computer Security 15 (6), 691-715, 2007
782007
An Architecture for an Adaptive Intrusion-Tolerant Server
A Valdes, M Almgren, S Cheung, Y Deswarte, B Dutertre, J Levy, H Sadi, ...
71*
Intrusion monitoring in process control systems
A Valdes, S Cheung
2009 42nd Hawaii International Conference on System Sciences, 1-7, 2009
572009
Detection, correlation, and visualization of attacks against critical infrastructure systems
L Briesemeister, S Cheung, U Lindqvist, A Valdes
2010 Eighth International Conference on Privacy, Security and Trust, 15-22, 2010
532010
The threat from the net [Internet security]
M Bishop, S Cheung, C Wee
IEEE spectrum 34 (8), 56-63, 1997
521997
An adaptive intrusion-tolerant server architecture
A Valdes, M Almgren, S Cheung, Y Deswarte, B Dutertre, J Levy, H Saïdi, ...
Proceedings of the 10th International Workshop on Security Protocols, 158-178, 2002
382002
EMERALD Intrusion Incident Report: 601 Message Specification
S Cheung
Aug, 2000
312000
Denial of service against the domain name system
S Cheung
IEEE security & privacy 4 (1), 40-45, 2006
302006
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20