Statistical anomaly detection for link-state routing protocols D Qu, BM Vetter, F Wang, R Narayan, SF Wu, YF Hou, F Gong, C Sargor Proceedings Sixth International Conference on Network Protocols (Cat. No …, 1998 | 88 | 1998 |
An experimental study of insider attacks for OSPF routing protocol B Vetter, F Wang, SF Wu Proceedings 1997 International Conference on Network Protocols, 293-300, 1997 | 84 | 1997 |
DECIDUOUS: decentralized source identification for network-based intrusions HY Chang, R Narayan, SF Wu, BM Vetter, X Wang, M Brown, JJ Yuill, ... Integrated Network Management VI. Distributed Management for the Networked …, 1999 | 81 | 1999 |
Secure routing protocols: Theory and practice F Wang, B Vetter, SF Wu Technical report, North Carolina State University, 1997 | 67 | 1997 |
Intrusion detection for link-state routing protocols SF Wu, F Wang, BM Vetter, WR Cleaveland II, YF Jou, F Gong, C Sargor In IEEE Symposium on Security and Privacy, 1997 | 34 | 1997 |
Deciduous: Decentralized Source Identification for Network-Based Intrusion. 6th IFIP HY Chang, R Narayan, SF Wu, BM Vetter, X Wang, M Brown, JJ Yuill, ... IEEE International Symposium on Integrated Network Management, IEEE …, 1999 | 5 | 1999 |