公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
---|---|---|---|---|---|---|
2011 | Building Biologically Inspired Defenses Against Malicious Software | F. V. Yarochkin; S. Y. Dai; Y. Huang; S. Y. Kuo; SY-YEN KUO | 41th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2011) | |||
2009 | Holography: A Hardware Virtualization Tool for Malware Analysis | S. Y. Dai; F. V. Yarochkin; Y. Huang; S. Y. Kuo; SY-YEN KUO | 2009 Pacific Rim International Symposium on Dependable Computing (PRDC'09) | 8 | 0 | |
2013 | Investigating DNS traffic anomalies for malicious activities | F. V. Yarochkin; V. Kropotov; Y. Huang; G. K. Ni; I. Y. Chen; S. Y. Kuo; SY-YEN KUO | 43rd IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2013) | 3 | 0 | |
2008 | Towards Adaptive Covert Communication System | F. V. Yarochkin; S. Y. Dai; Y, Huang; S. Y. Kuo; SY-YEN KUO | 2008 Pacific Rim International Symposium on Dependable Computing (PRDC'08) | 13 | 0 | |
2009 | Xprobe2++: Low volume remote network information gathering tool | F. V. Yarochkin; O. Arkin; M. Kydyraliev; S. Y. Dai; Y. Huang; S. Y. Kuo; SY-YEN KUO | 39th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2009) | 31 | 0 |