Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Securing the Software Defined Network Control Layer
- Phillip A. Porras, S. Cheung, M. Fong, K. Skinner, V. Yegneswaran
- Computer Science
- NDSS
- 2015
TLDR
StegoTorus: a camouflage proxy for the Tor anonymity system
- Zachary Weinberg, J. Wang, +4 authors D. Boneh
- Computer Science
- CCS '12
- 16 October 2012
TLDR
Detecting disruptive routers: a distributed network monitoring approach
- K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, R. Olsson
- Computer Science
- Proceedings. IEEE Symposium on Security and…
- 3 May 1998
TLDR
Modeling multistep cyber attacks for scenario recognition
- S. Cheung, U. Lindqvist, M. Fong
- Computer Science
- Proceedings DARPA Information Survivability…
- 22 April 2003
TLDR
Communication pattern anomaly detection in process control systems
TLDR
Protecting routing infrastructures from denial of service using cooperative intrusion detection
TLDR
Automatic analysis of firewall and network intrusion detection system configurations
TLDR
Intrusion Monitoring in Process Control Systems
TLDR
Denial of service against the Domain Name System
- S. Cheung
- Computer Science
- IEEE Security & Privacy Magazine
- 2006
TLDR
An Architecture for an Adaptive Intrusion-Tolerant Server
- A. Valdes, M. Almgren, +6 authors T. Uribe
- Computer Science
- Security Protocols Workshop
- 17 April 2002
TLDR