Xinyuan Wang
Affiliations:- George Mason University, Fairfax VA, USA
According to our database1,
Xinyuan Wang
authored at least 41 papers
between 1999 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on dl.acm.org
On csauthors.net:
Bibliography
2023
Detecting Stealthy Cobalt Strike C&C Activities via Multi-Flow based Machine Learning.
Proceedings of the International Conference on Machine Learning and Applications, 2023
2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
2015
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4939-3441-6, 2015
2014
CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution.
IEEE Trans. Dependable Secur. Comput., 2014
ACM Trans. Auton. Adapt. Syst., 2014
Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation.
Int. J. Crit. Infrastructure Prot., 2014
Proceedings of the Information Security - 17th International Conference, 2014
2013
Proceedings of the Security and Privacy in Communication Networks, 2013
2012
Comput. Networks, 2012
VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
2011
Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking.
IEEE Trans. Dependable Secur. Comput., 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the 19th International Workshop on Quality of Service, 2011
2010
Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction.
ACM Trans. Inf. Syst. Secur., 2010
An Application-Level Data Transparent Authentication Scheme without Communication Overhead.
IEEE Trans. Computers, 2010
Proceedings of the Information Security - 13th International Conference, 2010
2009
Proceedings of the 17th International Workshop on Quality of Service, 2009
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems.
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Computer Security, 2009
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers.
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
2007
Proceedings of the First USENIX Workshop on Offensive Technologies, 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms.
Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2006
2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2003
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.
Proceedings of the Computer Security, 2002
2001
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
1999
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999