Zhaoyan Xu

According to our database1, Zhaoyan Xu authored at least 16 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
DPX: Data-Plane eXtensions for SDN Security Service Instantiation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
HEX Switch: Hardware-assisted security extensions of OpenFlow.
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018

CloudRand: Building Heterogeneous and Moving-Target Network Interfaces.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2016
PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks.
Comput. Secur., 2016

2014
GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications.
Proceedings of the Computer Security - ESORICS 2014, 2014

SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA.
Proceedings of the Computer Security - ESORICS 2014, 2014

AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection.
Comput. Networks, 2013

PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

2012
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

EFFORT: Efficient and effective bot malware detection.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Automatic generation of vaccines for malware immunization.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

PeerPress: utilizing enemies' P2P strength against them.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


  Loading...