Steven Cheung
Zitiert von
Zitiert von
GrIDS-a graph based intrusion detection system for large networks
S Staniford-Chen, S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, ...
Proceedings of the 19th national information systems security conference 1 …, 1996
Using model-based intrusion detection for SCADA networks
S Cheung, B Dutertre, M Fong, U Lindqvist, K Skinner, A Valdes
Proceedings of the SCADA security scientific symposium 46, 1-12, 2007
Modeling multistep cyber attacks for scenario recognition
S Cheung, U Lindqvist, MW Fong
Proceedings DARPA Information Survivability Conference And Exposition 1, 284-292, 2003
Detecting disruptive routers: A distributed network monitoring approach
KA Bradley, S Cheung, N Puketza, B Mukherjee, RA Olsson
IEEE network 12 (5), 50-60, 1998
Securing the Software-Defined Network Control Layer
P Porras, S Cheung, M Fong, K Skinner, V Yegneswaran
Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS), 2015
Stegotorus: a camouflage proxy for the tor anonymity system
Z Weinberg, J Wang, V Yegneswaran, L Briesemeister, S Cheung, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Culture, gender, and response bias: An analysis of responses to the Self-Description Questionnaire
D Watkins, S Cheung
Journal of cross-cultural psychology 26 (5), 490-504, 1995
An efficient message authentication scheme for link state routing
S Cheung
Proceedings 13th Annual Computer Security Applications Conference, 90-98, 1997
Lightweight key management in wireless sensor networks by leveraging initial trust
B Dutertre, S Cheung, J Levy
Technical Report SRI-SDL-04-02, SRI International, 2004
Protecting routing infrastructures from denial of service using cooperative intrusion detection
S Cheung, KN Levitt
Proceedings of the 1997 workshop on New security paradigms, 94-106, 1998
The design of GrIDS: A graph-based intrusion detection system
S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, K Levitt, J Rowe, ...
Technical Report CSE-99-2, UC Davis Computer Science Department, 1999
Communication pattern anomaly detection in process control systems
A Valdes, S Cheung
2009 IEEE conference on technologies for homeland security, 22-29, 2009
Automatic analysis of firewall and network intrusion detection system configurations
TE Uribe, S Cheung
Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004
Intrusion monitoring in process control systems
A Valdes, S Cheung
2009 42nd Hawaii International Conference on System Sciences, 1-7, 2009
An Architecture for an Adaptive Intrusion-Tolerant Server
A Valdes, M Almgren, S Cheung, Y Deswarte, B Dutertre, J Levy, H Sadi, ...
Detection, correlation, and visualization of attacks against critical infrastructure systems
L Briesemeister, S Cheung, U Lindqvist, A Valdes
2010 Eighth International Conference on Privacy, Security and Trust, 15-22, 2010
The threat from the net [Internet security]
M Bishop, S Cheung, C Wee
IEEE spectrum 34 (8), 56-63, 1997
An adaptive intrusion-tolerant server architecture
A Valdes, M Almgren, S Cheung, Y Deswarte, B Dutertre, J Levy, H Saïdi, ...
Proceedings of the 10th International Workshop on Security Protocols, 158-178, 2002
Denial of service against the domain name system
S Cheung
IEEE security & privacy 4 (1), 40-45, 2006
A formal-specification based approach for protecting the domain name system
S Cheung, KN Levitt
Proceeding International Conference on Dependable Systems and Networks. DSN …, 2000
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20