Carol Fung
Title
Cited by
Cited by
Year
Dirichlet-based trust management for effective collaborative intrusion detection networks
CJ Fung, J Zhang, I Aib, R Boutaba
IEEE Transactions on Network and Service Management 8 (2), 79-91, 2011
982011
Trust management for host-based collaborative intrusion detection
CJ Fung, O Baysal, J Zhang, I Aib, R Boutaba
International Workshop on Distributed Systems: Operations and Management …, 2008
932008
A survey on security in network functions virtualization
W Yang, C Fung
2016 IEEE NetSoft Conference and Workshops (NetSoft), 15-19, 2016
842016
Robust and scalable trust management for collaborative intrusion detection
CJ Fung, J Zhang, I Aib, R Boutaba
2009 IFIP/IEEE International Symposium on Integrated Network Management, 33-40, 2009
822009
A Survey of Android Security Threats and Defenses.
B Rashidi, CJ Fung
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (3), 3-35, 2015
802015
FlowRanger: A request prioritizing algorithm for controller DoS attacks in Software Defined Networks
L Wei, C Fung
2015 IEEE International Conference on Communications (ICC), 5254-5259, 2015
752015
GUIDEX: A game-theoretic incentive-based mechanism for intrusion detection networks
Q Zhu, C Fung, R Boutaba, T Basar
IEEE Journal on Selected Areas in Communications 30 (11), 2220-2230, 2012
712012
Flowmon: Detecting malicious switches in software-defined networks
A Kamisiński, C Fung
Proceedings of the 2015 Workshop on Automated Decision Making for Active …, 2015
642015
Vfence: A defense against distributed denial of service attacks using network function virtualization
AHM Jakaria, W Yang, B Rashidi, C Fung, MA Rahman
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
542016
A collaborative DDoS defence framework using network function virtualization
B Rashidi, C Fung, E Bertino
IEEE Transactions on Information Forensics and Security 12 (10), 2483-2497, 2017
532017
Secure data encryption based on quantum walks for 5G Internet of Things scenario
AA Abd El-Latif, B Abd-El-Atty, W Mazurczyk, C Fung, ...
IEEE Transactions on Network and Service Management 17 (1), 118-131, 2020
522020
A game-theoretical approach to incentive design in collaborative intrusion detection networks
Q Zhu, C Fung, R Boutaba, T Basar
2009 International Conference on Game Theory for Networks, 384-392, 2009
512009
Design and management of collaborative intrusion detection networks
CJ Fung, R Boutaba
2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013
492013
Collaborative Intrusion Detection Networks and Insider Attacks.
CJ Fung
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 63-74, 2011
482011
Bayesian decision aggregation in collaborative intrusion detection networks
CJ Fung, Q Zhu, R Boutaba, T Başar
2010 IEEE Network Operations and Management Symposium-NOMS 2010, 349-356, 2010
482010
VGuard: A distributed denial of service attack mitigation method using network function virtualization
CJ Fung, B McCormick
2015 11th International Conference on Network and Service Management (CNSM …, 2015
472015
FACID: A trust-based collaborative decision framework for intrusion detection networks
CJ Fung, Q Zhu
Ad Hoc Networks 53, 17-31, 2016
442016
Android resource usage risk assessment using hidden Markov model and online learning
B Rashidi, C Fung, E Bertino
Computers & Security 65, 90-107, 2017
422017
MAC Layer Security of 802.15.4-Compliant Networks
VB Mišić, J Fung, J Mišić
International Workshop on Wireless and Sensor Network Security (WSNS’05 …, 2005
40*2005
Trust management and admission control for host-based collaborative intrusion detection
C Fung, J Zhang, I Aib, R Boutaba
Journal of Network and Systems Management 19 (2), 257-277, 2011
362011
The system can't perform the operation now. Try again later.
Articles 1–20