2024
USBIPS Framework: Protecting Hosts from Malicious USB Peripherals.
CoRR, 2024
A Vehicle Forensics framework with Post-Quantum Cryptography and Blockchain.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2024
2023
Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy.
Inf., 2023
2021
DPC: A Dynamic Permission Control Mechanism for Android Third-Party Libraries.
IEEE Trans. Dependable Secur. Comput., 2021
DDoS Flood and Destination Service Changing Sensor.
Sensors, 2021
SMS Observer: A dynamic mechanism to analyze the behavior of SMS-based malware.
J. Parallel Distributed Comput., 2021
IoTD: An approach to identify E-mails sent by IoT devices.
Comput. Commun., 2021
Identifying IoT Devices with SMTP.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021
2020
A passive user-side solution for evil twin access point detection at public hotspots.
Int. J. Commun. Syst., 2020
A Kernel Module Based Mechanism to Establish a TCP/IP Connection When Destination Service Changing.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020
2019
A solution to detect the existence of a malicious rogue AP.
Comput. Commun., 2019
Keep Rogue IoT Away: IoT Detector Based on Diversified TLS Negotiation.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
2018
A Cloud-based Protection approach against JavaScript-based attacks to browsers.
Comput. Electr. Eng., 2018
Handover: A mechanism to improve the reliability and availability of network services for clients behind a network address translator.
Comput. Electr. Eng., 2018
2017
Detecting Web-Based Botnets Using Bot Communication Traffic Features.
Secur. Commun. Networks, 2017
A client-side detection mechanism for evil twins.
Comput. Electr. Eng., 2017
2016
Data concealments with high privacy in new technology file system.
J. Supercomput., 2016
VRS: a values-based reputation system for web services.
Secur. Commun. Networks, 2016
Libra: An Adaptive Method for Protecting Memory from Arbitrary Overwrite.
J. Comput., 2016
2015
Defeat scanning worms in cyber warfare.
Secur. Commun. Networks, 2015
Web security in a windows system as PrivacyDefender in private browsing mode.
Multim. Tools Appl., 2015
Bypass Cell-phone-verification Through a Smartphone-based Botnet.
J. Inf. Sci. Eng., 2015
The bilateral communication-based dynamic extensible honeypot.
Proceedings of the International Carnahan Conference on Security Technology, 2015
2014
Visible watermarking with reversibility of multimedia images for ownership declarations.
J. Supercomput., 2014
Image reversibility in data embedding on the basis of blocking-predictions.
Peer-to-Peer Netw. Appl., 2014
Detect Fast-Flux Domains Through Response Time Differences.
IEEE J. Sel. Areas Commun., 2014
Hawkeye: Finding spamming accounts.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014
2013
Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion.
J. Supercomput., 2013
Reversible data hiding using side-match predictions on steganographic images.
Multim. Tools Appl., 2013
ARMORY: An automatic security testing tool for buffer overflow defect detection.
Comput. Electr. Eng., 2013
2012
Antivirus Software Shield Against Antivirus Terminators.
IEEE Trans. Inf. Forensics Secur., 2012
Dual-Watermarking by QR-code Applications in Image Processing.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
2011
BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks.
IEEE J. Sel. Areas Commun., 2011
A Robust Kernel-Based Solution to Control-Hijacking Buffer Overflow Attacks.
J. Inf. Sci. Eng., 2011
TransSQL: A Translation and Validation-Based Solution for SQL-injection Attacks.
Proceedings of the First International Conference on Robot, Vision and Signal Processing, 2011
Reversible Watermarking Scheme with Visibility Using Randomize Distance.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011
2010
HSP: A solution against heap sprays.
J. Syst. Softw., 2010
A Signal-Representation-Based Parser to Extract Text-Based Information from the Web.
J. Adv. Comput. Intell. Intell. Informatics, 2010
A neural tree and its application to spam e-mail detection.
Expert Syst. Appl., 2010
Actor Garbage Collection Using Vertex-Preserving Actor-to-Object Graph Transformations.
Proceedings of the Advances in Grid and Pervasive Computing, 5th International Conference, 2010
2006
Scalable network-based buffer overflow attack detection.
Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2006
2004
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
A Path Information Caching and Aggregation Approach to Traffic Source Identification.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003
2002
Sago: A Network Resource Management System for Real-Time Content Distribution.
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002
2001
RAD: A Compile-Time Solution to Buffer Overflow Attacks.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001