Follow
Xinyuan Wang
Xinyuan Wang
Associate Professor of Computer Science, George Mason University
Verified email at gmu.edu - Homepage
Title
Cited by
Cited by
Year
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction
X Jiang, X Wang, D Xu
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010
9242010
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction
X Jiang, X Wang, D Xu
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010
9242010
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
X Wang, DS Reeves
Proceedings of the 10th ACM conference on Computer and communications …, 2003
3492003
Tracking anonymous peer-to-peer voip calls on the internet
X Wang, S Chen, S Jajodia
Proceedings of the 12th ACM conference on Computer and communications …, 2005
3282005
Containment of Unknown and Polymorphic Fast Spreading Worms
S Chen, X Wang
US Patent App. 12/042,587, 2008
3142008
Network flow watermarking attack on low-latency anonymous communication systems
X Wang, S Chen, S Jajodia
2007 IEEE Symposium on Security and Privacy (SP'07), 116-130, 2007
2972007
Interval centroid based watermark
X Wang, S Chen
US Patent 7,724,782, 2010
2272010
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
X Wang, DS Reeves, SF Wu
European Symposium on Research in Computer Security, 244-263, 2002
2202002
ReFormat: Automatic reverse engineering of encrypted messages
Z Wang, X Jiang, W Cui, X Wang, M Grace
European Symposium on Research in Computer Security, 200-215, 2009
2152009
Sleepy watermark tracing: An active network-based intrusion response framework
X Wang, DS Reeves, SF Wu, J Yuill
IFIP International Information Security Conference, 369-384, 2001
2112001
“Out-of-the-box” Monitoring of VM-based High-Interaction Honeypots
X Jiang, X Wang
International Workshop on Recent Advances in Intrusion Detection, 198-218, 2007
1982007
Tracing traffic through intermediate hosts that repacketize flows
YJ Pyun, YH Park, X Wang, DS Reeves, P Ning
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1522007
Countering persistent kernel rootkits through systematic hook discovery
Z Wang, X Jiang, W Cui, X Wang
International Workshop on Recent Advances in Intrusion Detection, 21-38, 2008
1282008
Billing Attacks on SIP-Based VoIP Systems.
R Zhang, X Wang, X Yang, X Jiang
WOOT 7, 1-8, 2007
932007
Deciduous: Decentralized source identification for network-based intrusions
HY Chang, R Narayan, SF Wu, BM Vetter, X Wang, M Brown, JJ Yuill, ...
Integrated Network Management VI. Distributed Management for the Networked …, 1999
811999
A first step towards live botmaster traceback
D Ramsbrock, X Wang, X Jiang
International Workshop on Recent Advances in Intrusion Detection, 59-77, 2008
752008
Active timing-based correlation of perturbed traffic flows with chaff packets
P Peng, P Ning, DS Reeves, X Wang
25th IEEE International Conference on Distributed Computing Systems …, 2005
662005
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
R Zhang, X Wang, R Farley, X Yang, X Jiang
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
642009
Robust correlation of encrypted attack traffic through stepping stones by flow watermarking
X Wang, D Reeves
IEEE Transactions on Dependable and Secure Computing 8 (3), 434-449, 2010
542010
On the anonymity and traceability of peer-to-peer VoIP calls
S Chen, X Wang, S Jajodia
IEEE Network 20 (5), 32-37, 2006
532006
The system can't perform the operation now. Try again later.
Articles 1–20