Billing attacks on SIP-based VoIP systems

Xuxian Jiang , Ruishan Zhang , Xiaohui Yang , Xinyuan Wang
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies 4

54
2007
Thwarting spam over internet telephony (SPIT) attacks on VoIP networks

Art Nichols , Hemant Sengar , Xinyuan Wang
international workshop on quality of service 1 -3

11
2011
Traceback and Anonymity

Douglas Reeves , Xinyuan Wang

2
2015
Interval centroid based watermark decoder

Shiping Chen , Xinyuan Wang

3
2010
Roving Bugnet: Distributed Surveillance Threat and Mitigation

Ryan Farley , Xinyuan Wang
information security conference 297 39 -50

1
2009
The Botnet Problem

Xinyuan Wang , Daniel Ramsbrock
Computer and Information Security Handbook 119 -132

7
2009
Out-of-the-Box monitoring of VM-based high-interaction honeypots

Xuxian Jiang , Xinyuan Wang
recent advances in intrusion detection 198 -218

132
2007
Roving bugnet: Distributed surveillance threat and mitigation

Ryan Farley , Xinyuan Wang
Computers & Security 29 ( 5) 592 -602

8
2010
VoIP Security: Vulnerabilities, Exploits, and Defenses

Xinyuan Wang , Ruishan Zhang
Advances in Computers 81 1 -49

2
2011
An Application-Level Data Transparent Authentication Scheme without Communication Overhead

Songqing Chen , Shiping Chen , Xinyuan Wang , Zhao Zhang
IEEE Transactions on Computers 59 ( 7) 943 -954

5
2010
13
2004
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems

Ruishan Zhang , Xinyuan Wang , Xiaohui Yang , Ryan Farley
Information Security Practice and Experience 59 -70

5
2009
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays

Xinyuan Wang , Douglas S. Reeves
computer and communications security 20 -29

252
2003
Voice pharming attack and the trust of VoIP

Xinyuan Wang , Ruishan Zhang , Xiaohui Yang , Xuxian Jiang
Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08 24

25
2008
Tracking anonymous peer-to-peer VoIP calls on the internet

Xinyuan Wang , Shiping Chen , Sushil Jajodia
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05 81 -91

234
2005
Existing Approaches in Traceback

Xinyuan Wang , Douglas Reeves , Xinyuan Wang , Douglas Reeves
Traceback and Anonymity 15 -22

2015
Anonymity

Xinyuan Wang , Douglas Reeves , Xinyuan Wang , Douglas Reeves
Traceback and Anonymity 49 -56

2015
The Traceback Problem

Xinyuan Wang , Douglas Reeves , Xinyuan Wang , Douglas Reeves
Traceback and Anonymity 5 -13

1
2015
Active Timing Based Traceback

Xinyuan Wang , Douglas Reeves , Xinyuan Wang , Douglas Reeves
Traceback and Anonymity 23 -47

2015