Carol Fung
Title
Cited by
Cited by
Year
Dirichlet-based trust management for effective collaborative intrusion detection networks
CJ Fung, J Zhang, I Aib, R Boutaba
IEEE Transactions on Network and Service Management 8 (2), 79-91, 2011
932011
Trust management for host-based collaborative intrusion detection
CJ Fung, O Baysal, J Zhang, I Aib, R Boutaba
International Workshop on Distributed Systems: Operations and Management …, 2008
812008
Robust and scalable trust management for collaborative intrusion detection
CJ Fung, J Zhang, I Aib, R Boutaba
2009 IFIP/IEEE International Symposium on Integrated Network Management, 33-40, 2009
762009
A survey on security in network functions virtualization
W Yang, C Fung
2016 IEEE NetSoft Conference and Workshops (NetSoft), 15-19, 2016
682016
FlowRanger: A request prioritizing algorithm for controller DoS attacks in Software Defined Networks
L Wei, C Fung
2015 IEEE International Conference on Communications (ICC), 5254-5259, 2015
682015
GUIDEX: A game-theoretic incentive-based mechanism for intrusion detection networks
Q Zhu, C Fung, R Boutaba, T Basar
IEEE Journal on Selected Areas in Communications 30 (11), 2220-2230, 2012
672012
A Survey of Android Security Threats and Defenses.
B Rashidi, CJ Fung
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (3), 3-35, 2015
652015
Flowmon: Detecting malicious switches in software-defined networks
A Kamisiński, C Fung
Proceedings of the 2015 Workshop on Automated Decision Making for Active …, 2015
502015
A game-theoretical approach to incentive design in collaborative intrusion detection networks
Q Zhu, C Fung, R Boutaba, T Basar
2009 International Conference on Game Theory for Networks, 384-392, 2009
472009
Vfence: A defense against distributed denial of service attacks using network function virtualization
AHM Jakaria, W Yang, B Rashidi, C Fung, MA Rahman
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
422016
Bayesian decision aggregation in collaborative intrusion detection networks
CJ Fung, Q Zhu, R Boutaba, T Başar
2010 IEEE Network Operations and Management Symposium-NOMS 2010, 349-356, 2010
412010
Vguard: A distributed denial of service attack mitigation method using network function virtualization
CJ Fung, B McCormick
2015 11th International Conference on Network and Service Management (CNSM …, 2015
402015
Collaborative Intrusion Detection Networks and Insider Attacks.
CJ Fung
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 63-74, 2011
402011
Design and management of collaborative intrusion detection networks
CJ Fung, R Boutaba
2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013
392013
A collaborative ddos defence framework using network function virtualization
B Rashidi, C Fung, E Bertino
IEEE Transactions on Information Forensics and Security 12 (10), 2483-2497, 2017
362017
MAC Layer Security of 802.15.4-Compliant Networks
VB Mišić, J Fung, J Mišić
International Workshop on Wireless and Sensor Network Security (WSNS’05 …, 2005
35*2005
Facid: A trust-based collaborative decision framework for intrusion detection networks
CJ Fung, Q Zhu
Ad Hoc Networks 53, 17-31, 2016
322016
Android resource usage risk assessment using hidden Markov model and online learning
B Rashidi, C Fung, E Bertino
Computers & Security 65, 90-107, 2017
312017
Dude, ask the experts!: Android resource access permission recommendation with RecDroid
B Rashidi, C Fung, T Vu
2015 IFIP/IEEE international symposium on integrated network management (IM …, 2015
312015
Recdroid: A resource access permission control portal and recommendation service for smartphone users
B Rashidi, C Fung, T Vu
Proceedings of the ACM MobiCom workshop on Security and privacy in mobile …, 2014
312014
The system can't perform the operation now. Try again later.
Articles 1–20