William Enck , Xuxian Jiang , Amiya Bhattacharya , Partha Dasgupta
computer and communications security
Xuxian Jiang , Xiapu Luo , Haoyu Wang , Yao Guo
usenix security symposium
Wu Zhou , Xinwen Zhang , Xuxian Jiang
computer and communications security 1 -12
Vaibhav Rastogi , Yan Chen , Xuxian Jiang
computer and communications security 329 -334
Weiliang Luo , Shouhuai Xu , Xuxian Jiang
international workshop on security 11 -18
Junghwan Rhee , Ryan Riley , Dongyan Xu , Xuxian Jiang
availability, reliability and security 74 -81
Xuxian Jiang , Xingquan Zhu
Knowledge and Information Systems 18 ( 2) 231 -262
Xuxian Jiang , Xinyuan Wang
recent advances in intrusion detection 198 -218
Minh Tran , Xinshu Dong , Zhenkai Liang , Xuxian Jiang
Applied Cryptography and Network Security 418 -435
Junghwan Rhee , Ryan Riley , Dongyan Xu , Xuxian Jiang
recent advances in intrusion detection 178 -197
Jian Mao , Jingdong Bian , Hanjun Ma , Yaoqi Jia
international conference on communications 1 -6
Yajin Zhou , Kapil Singh , Xuxian Jiang
trust and trustworthy computing 55 -73
Karim O. Elish , Xiaokui Shu , Danfeng (Daphne) Yao , Barbara G. Ryder
Computers & Security 49 255 -273
Xuxian Jiang , Helen J. Wangz , Dongyan Xu , Yi-Min Wang
symposium on reliable distributed systems 209 -218
Sina Bahram , Xuxian Jiang , Zhi Wang , Mike Grace
symposium on reliable distributed systems 82 -91
Zhongshu Gu , Zhui Deng , Dongyan Xu , Xuxian Jiang
symposium on reliable distributed systems 147 -156
Xuxian Jiang , Dongyan Xu
Parallel and Distributed Processing and Applications 937 -946
Jinku Li , Zhi Wang , Tyler Bletsch , Deepa Srinivasan
IEEE Transactions on Information Forensics and Security 6 ( 4) 1404 -1417
Dongyan Xu , Eugene H Spafford , Xuxian Jiang , PURDUE UNIV LAFAYETTE IN
Defense Technical Information Center
Yajin Zhou , Kunal Patel , Lei Wu , Zhi Wang
computer and communications security 19 -30