第 1 到 37 筆結果,共 37 筆。
公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 | |
---|---|---|---|---|---|---|---|
1 | 2014 | YourPassword: applying feedback loops to improve security behavior of managing multiple passwords. | Kim, Tiffany Hyun-Jin; Stuart, H. Colleen; Hsiao, Hsu-Chun; Lin, Yue-Hsun; Zhang, Leon; Dabbish, Laura; Kiesler, Sara B.; HSU-CHUN HSIAO | 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014 | 2 | 0 | |
2 | 2013 | STRIDE: sanctuary trail - refuge from internet DDoS entrapment. | HSU-CHUN HSIAO ; Kim, Tiffany Hyun-Jin; Yoo, Sangjae; Zhang, Xin; Lee, Soo Bum; Gligor, Virgil D. | 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 | 12 | 0 | |
3 | 2021 | Speed records in network flow measurement on FPGA | Sateesan A; Vliegen J; Scherrer S; HSU-CHUN HSIAO ; Perrig A; Mentens N. | Proceedings - 2021 31st International Conference on Field-Programmable Logic and Applications, FPL 2021 | 7 | 0 | |
4 | 2009 | SPATE: small-group PKI-less authenticated trust establishment. | Lin, Yue-Hsun; Studer, Ahren; Hsiao, Hsu-Chun; McCune, Jonathan M.; Wang, King-Hang; Krohn, Maxwell N.; Lin, Phen-Lan; Perrig, Adrian; Sun, Hung-Min; HSU-CHUN HSIAO | Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (MobiSys 2009), Krak?w, Poland, June 22-25, 2009 | 41 | 0 | |
5 | 2016 | SIBRA: Scalable Internet Bandwidth Reservation Architecture. | Basescu, Cristina; Reischuk, Raphael M.; Szalachowski, Pawel; Perrig, Adrian; Zhang, Yao; Hsiao, Hsu-Chun; Kubota, Ayumu; Urakawa, Jumpei; HSU-CHUN HSIAO | 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21-24, 2016 | |||
6 | 2012 | ShortMAC: Efficient Data-plane Fault Localization | Zhang, Xin; Zhou, Zongwei; HSU-CHUN HSIAO ; Kim, Tiffany Hyun Jin; Perrig, Adrian; Tague, Patrick | 19th Annual Network and Distributed System Security Symposium, NDSS 2012 | |||
7 | 2017 | Security implications of redirection trail in popular websites worldwide | Chang, Li; HSU-CHUN HSIAO ; Jeng, Wei ; Kim, Tiffany Hyun Jin | 26th International World Wide Web Conference | 10 | 0 | |
8 | 2016 | Securing data planes in software-defined networks | Chao, T.-W.; Ke, Y.-M.; Chen, B.-H.; Chen, J.-L.; Hsieh, C.J.; Lee, S.-C.; HSU-CHUN HSIAO | IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services | 31 | 0 | |
9 | 2016 | A secure authorization system in PHR based on CP-ABE | Chung, H.H.; Wang, P.S.; Ho, T.-W.; Hsiao, H.-C.; FEI-PEI LAI ; HSU-CHUN HSIAO | 2015 E-Health and Bioengineering Conference, EHB 2015 | 1 | 0 | |
10 | 2018 | SDNProbe: Lightweight fault localization in the error-prone environment | Ke, Y.-M.; Hsiao, H.-C.; HSU-CHUN HSIAO | Proceedings - International Conference on Distributed Computing Systems | 13 | 0 | |
11 | 2011 | SCION: Scalability, Control, and Isolation on Next-Generation Networks. | Zhang, Xin; Hsiao, Hsu-Chun; Hasker, Geoffrey; Chan, Haowen; Perrig, Adrian; HSU-CHUN HSIAO | 32nd IEEE Symposium on Security and Privacy, S&P 2011, 22-25 May 2011, Berkeley, California, USA | 110 | 0 | |
12 | 2017 | SandUSB: An installation-free sandbox for USB peripherals | Loe, E.L.; Hsiao, H.-C.; Kim, T.H.-J.; Lee, S.-C.; HSU-CHUN HSIAO | 2016 IEEE 3rd World Forum on Internet of Things, WF-IoT 2016 | 12 | 0 | |
13 | 2021 | ProMutator: Detecting Vulnerable Price Oracles in DeFi by Mutated Transactions | Wang S.-H; Wu C.-C; Liang Y.-C; Hsieh L.-H; HSU-CHUN HSIAO | Proceedings - 2021 IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2021 | 5 | 0 | |
14 | 2016 | A practical system for guaranteed access in the presence of DDoS attacks and flash crowds | Kung, Yi Hsuan; Lee, Taeho; Tseng, Po Ning; HSU-CHUN HSIAO ; Kim, Tiffany Hyun Jin; Lee, Soo Bum; Lin, Yue Hsun; Perrig, Adrian | Proceedings - International Conference on Network Protocols, ICNP | 2 | 0 | |
15 | 2020 | Poster: Challenges in Stopping Ticket Scalping Bots | Yang, H.-C.; Lee, H.; Hsiao, H.-C.; HSU-CHUN HSIAO | Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020 | 0 | 0 | |
16 | 2013 | Policy-based secure deletion. | Cachin, Christian; Haralambiev, Kristiyan; Hsiao, Hsu-Chun; HSU-CHUN HSIAO | 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013 | 46 | 0 | |
17 | 2020 | On using camera-based visible light communication for security protocols | Chu W.-Y; Yu T.-G; Lin Y.-K; Lee S.-C; HSU-CHUN HSIAO | Proceedings - 2020 IEEE Symposium on Security and Privacy Workshops, SPW 2020 | 1 | 0 | |
18 | 2020 | On the privacy risks of compromised trigger-action platforms | Chiang, Y.-H.; Hsiao, H.-C.; Yu, C.-M.; Kim, T.H.-J.; HSU-CHUN HSIAO | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2 | 0 | |
19 | 2019 | On the Feasibility of Rerouting-Based DDoS Defenses | Tran, M.; Kang, M.S.; Hsiao, H.-C.; Chiang, W.-H.; Tung, S.-P.; HSU-CHUN HSIAO | Proceedings - IEEE Symposium on Security and Privacy | 18 | 0 | |
20 | 2016 | Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes | Yeh J.-R.; Hsiao H.-C.; AI-CHUN PANG ; HSU-CHUN HSIAO | 11th Asia Joint Conference on Information Security | 8 | 0 | |
21 | 2021 | Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows | Scherrer S; Wu C.-Y; Chiang Y.-H; Rothenberger B; Asoni D.E; Sateesan A; Vliegen J; Mentens N; Perrig A.; HSU-CHUN HSIAO | Proceedings of the IEEE Symposium on Reliable Distributed Systems | 5 | 0 | |
22 | 2012 | LAP: Lightweight Anonymity and Privacy. | Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Perrig, Adrian; Yamada, Akira; Nelson, Samuel C.; Gruteser, Marco; HSU-CHUN HSIAO | IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA | 48 | 0 | |
23 | 2022 | LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR | Mow, Wei Loon; Huang, Shih Kun; HSU-CHUN HSIAO | 5th IEEE Conference on Dependable and Secure Computing, DSC 2022 and SECSOC 2022 Workshop, PASS4IoT 2022 Workshop SICSA International Paper/Poster Competition in Cybersecurity | 0 | 0 | |
24 | 2022 | Know Your Victim: Tor Browser Setting Identification via Network Traffic Analysis | Chang, Chun Ming; HSU-CHUN HSIAO ; Lynar, Timothy; Mori, Tatsuya | WWW 2022 - Companion Proceedings of the Web Conference 2022 | 0 | 0 | |
25 | 2020 | Keeping Passwords in Your Pocket: Managing Password Locally with Mobile Fingerprint Sensors | Lin, P.-Y.; Zhou, Z.-Y.; Chang, C.-M.; Chen, H.-W.; Tung, S.-P.; Hsiao, H.-C.; HSU-CHUN HSIAO | The Web Conference 2020 - Companion of the World Wide Web Conference, WWW 2020 | 0 | 0 | |
26 | 2022 | Investigating Advertisers' Domain-changing Behaviors and Their Impacts on Ad-blocker Filter Lists | Lin S.-C; Chou K.-H; Chen Y; HSU-CHUN HSIAO ; Cassel D; Bauer L; Jia L. | WWW 2022 - Proceedings of the ACM Web Conference 2022 | 1 | 0 | |
27 | 2020 | Hybrid-Voting: A Hybrid Structured Electronic Voting System | Wang, P.-L.; Yang, S.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO | The Web Conference 2020 - Companion of the World Wide Web Conference, WWW 2020 | 1 | 0 | |
28 | 2018 | A generic web application testing and attack data generation method | Shih, H.-Y.; Lu, H.-L.; Yeh, C.-C.; Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO | Advances in Intelligent Systems and Computing | 3 | 0 | |
29 | 2014 | Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region. | Wu, Hao; Hsiao, Hsu-Chun; HSU-CHUN HSIAO | Proceedings of the 2014 Internet Measurement Conference, IMC 2014, Vancouver, BC, Canada, November 5-7, 2014 | 12 | 0 | |
30 | 2011 | Efficient and secure threshold-based event validation for VANETs. | Hsiao, Hsu-Chun; Studer, Ahren; Dubey, Rituik; Shi, Elaine; HSU-CHUN HSIAO | Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011 | 30 | 0 | |
31 | 2019 | Dynamic Path Pruning in Symbolic Execution | Chen, Y.-S.; Chen, W.-N.; Wu, C.-Y.; Hsiao, H.-C.; HSU-CHUN HSIAO | DSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing | 0 | 0 | |
32 | 2018 | DAMUP: Practical and privacy-aware cloud-based DDoS mitigation | Lin, S.-C.; Huang, P.-W.; Wang, H.-Y.; HSU-CHUN HSIAO | IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018 | 1 | 0 | |
33 | 2018 | CLEF: Limiting the Damage Caused by Large Flows in the Internet Core. | Wu, Hao; Hsiao, Hsu-Chun; Asoni, Daniele Enrico; Scherrer, Simon; Perrig, Adrian; Hu, Yih-Chun; HSU-CHUN HSIAO | Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings | 0 | 0 | |
34 | 2016 | CICADAS: Congesting the internet with coordinated and decentralized pulsating attacks | Ke, Y.-M.; Chen, C.-W.; Hsiao, H.-C.; Perrig, A.; HSU-CHUN HSIAO | ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security | 13 | 0 | |
35 | 2023 | Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers | Wang, Ping Lun; Chou, Kai Hsiang; Hsiao, Shou Ching; Low, Ann Tene; Kim, Tiffany Hyun Jin; HSU-CHUN HSIAO | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 0 | 0 | |
36 | 2023 | ALBUS: A Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks | Scherrer, Simon; Vliegen, Jo; Sateesan, Arish; HSU-CHUN HSIAO ; Mentens, Nele; Perrig, Adrian | Proceedings of the IEEE Symposium on Reliable Distributed Systems | |||
37 | 2009 | A study of user-friendly hash comparison schemes | Hsiao, H.-C.; Lin, Y.-H.; Studer, A.; Studer, C.; Wang, K.-H.; Kikuchi, H.; Perrig, A.; Sun, H.-M.; HSU-CHUN HSIAO | Annual Computer Security Applications Conference | 33 | 0 |