Obserwuj
Fei Wang
Fei Wang
PhD candidate, Department of Computer Science, Purdue University
Zweryfikowany adres z purdue.edu
Tytuł
Cytowane przez
Cytowane przez
Rok
Hercule: Attack story reconstruction via community discovery on correlated log graph
K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ...
Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016
1222016
{MPI}: Multiple perspective attack investigation with semantic aware execution partitioning
S Ma, J Zhai, F Wang, KH Lee, X Zhang, D Xu
26th USENIX Security Symposium (USENIX Security 17), 1111-1128, 2017
932017
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
NDSS 2, 4, 2018
712018
PS-TRUST: Provably secure solution for truthful double spectrum auctions
Z Chen, L Huang, L Li, W Yang, H Miao, M Tian, F Wang
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1249-1257, 2014
372014
A novel text steganography by context-based equivalent substitution
F Wang, L Huang, Z Chen, W Yang, H Miao
2013 IEEE international conference on signal processing, communication and …, 2013
182013
Lprov: Practical library-aware provenance tracing
F Wang, Y Kwon, S Ma, X Zhang, D Xu
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
122018
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
Y Ye, Z Zhang, F Wang, X Zhang, D Xu
NDSS, 2021
92021
A novel distributed covert channel in HTTP
F Wang, L Huang, H Miao, M Tian
Security and Communication Networks 7 (6), 1031-1041, 2014
52014
LiHB: Lost in HTTP Behaviors-A Behavior-Based Covert Channel in HTTP
Y Shen, L Huang, F Wang, X Lu, W Yang, L Li
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia …, 2015
32015
Steganography in HTML Based on Substitution of Script Codes
F Wang, L Huang, H Miao, Z Chen, W Yang
International Journal of Security and Its Applications 7 (4), 387-397, 2013
22013
Profactory: Improving iot security via formalized protocol customization
F Wang, J Wu, Y Nan, Y Aafer, X Zhang, D Xu, M Payer
Proc. of USENIX Security’22, 2022
12022
A novel web tunnel detection method based on protocol behaviors
F Wang, L Huang, Z Chen, H Miao, W Yang
International Conference on Security and Privacy in Communication Systems …, 2013
12013
FORENSICS AND FORMALIZED PROTOCOL CUSTOMIZATION FOR ENHANCING NETWORKING SECURITY
F Wang
Purdue University, 2021
2021
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–13