Xuxian Jiang , Ruishan Zhang , Xiaohui Yang , Xinyuan Wang
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies 4
Songqing Chen , Xinyuan Wang
Art Nichols , Hemant Sengar , Xinyuan Wang
international workshop on quality of service 1 -3
Douglas Reeves , Xinyuan Wang
Shiping Chen , Xinyuan Wang
Ryan Farley , Xinyuan Wang
information security conference 297 39 -50
Xinyuan Wang , Daniel Ramsbrock
Computer and Information Security Handbook 119 -132
Xuxian Jiang , Xinyuan Wang
recent advances in intrusion detection 198 -218
Ryan Farley , Xinyuan Wang
Computers & Security 29 ( 5) 592 -602
Xinyuan Wang , Ruishan Zhang
Advances in Computers 81 1 -49
Songqing Chen , Shiping Chen , Xinyuan Wang , Zhao Zhang
IEEE Transactions on Computers 59 ( 7) 943 -954
Xinyuan Wang
acm symposium on applied computing 404 -411
Ruishan Zhang , Xinyuan Wang , Xiaohui Yang , Ryan Farley
Information Security Practice and Experience 59 -70
Xinyuan Wang , Douglas S. Reeves
computer and communications security 20 -29
Xinyuan Wang , Ruishan Zhang , Xiaohui Yang , Xuxian Jiang
Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08 24
Xinyuan Wang , Shiping Chen , Sushil Jajodia
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05 81 -91
Xinyuan Wang , Douglas Reeves , Xinyuan Wang , Douglas Reeves
Traceback and Anonymity 15 -22
Xinyuan Wang , Douglas Reeves , Xinyuan Wang , Douglas Reeves
Traceback and Anonymity 49 -56
Xinyuan Wang , Douglas Reeves , Xinyuan Wang , Douglas Reeves
Traceback and Anonymity 5 -13
Xinyuan Wang , Douglas Reeves , Xinyuan Wang , Douglas Reeves
Traceback and Anonymity 23 -47