default search action
Vrizlynn L. L. Thing
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Balachandar Gowrisankar, Vrizlynn L. L. Thing:
An adversarial attack approach for eXplainable AI evaluation on deepfake detection models. Comput. Secur. 139: 103684 (2024) - [j35]Xinxing Zhao, Kar-Wai Fok, Vrizlynn L. L. Thing:
Enhancing network intrusion detection performance using generative adversarial networks. Comput. Secur. 145: 104005 (2024) - [j34]Jonathan W. Z. Lim, Vrizlynn L. L. Thing:
Building Confidence in a World of Eroding Trust. Digit. Gov. Res. Pract. 5(2): 16 (2024) - [c66]Zihao Wang, Kar-Wai Fok, Vrizlynn L. L. Thing:
Emerging Trends in 5G Malicious Traffic Analysis: Enhancing Incremental Learning Intrusion Detection Strategies. CSR 2024: 114-119 - [c65]Wanyu Hu, Vrizlynn L. L. Thing:
CPE-Identifier: Automated CPE Identification and CVE Summaries Annotation with Deep Learning and NLP. ICISSP 2024: 67-78 - [i25]Zihao Wang, Kar-Wai Fok, Vrizlynn L. L. Thing:
Exploring Emerging Trends in 5G Malicious Traffic Analysis and Incremental Learning Intrusion Detection Strategies. CoRR abs/2402.14353 (2024) - [i24]Kishore Rajasekar, Randolph Loh, Kar-Wai Fok, Vrizlynn L. L. Thing:
Privacy preserving layer partitioning for Deep Neural Network models. CoRR abs/2404.07437 (2024) - [i23]Xinxing Zhao, Kar-Wai Fok, Vrizlynn L. L. Thing:
Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks. CoRR abs/2404.07464 (2024) - [i22]Martin Kodys, Zhongmin Dai, Vrizlynn L. L. Thing:
Privacy-Preserving Intrusion Detection using Convolutional Neural Networks. CoRR abs/2404.09625 (2024) - [i21]Wanyu Hu, Vrizlynn L. L. Thing:
CPE-Identifier: Automated CPE identification and CVE summaries annotation with Deep Learning and NLP. CoRR abs/2405.13568 (2024) - [i20]Ayush Kumar, Vrizlynn L. L. Thing:
Evaluating The Explainability of State-of-the-Art Machine Learning-based IoT Network Intrusion Detection Systems. CoRR abs/2408.14040 (2024) - 2023
- [j33]Zihao Wang, Vrizlynn L. L. Thing:
Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms. Comput. Secur. 128: 103143 (2023) - [j32]Rahul Kale, Vrizlynn L. L. Thing:
Few-shot weakly-supervised cybersecurity anomaly detection. Comput. Secur. 130: 103194 (2023) - [j31]Jonathan W. Z. Lim, Vrizlynn L. L. Thing:
Toward a Universal and Sustainable Privacy Protection Framework. Digit. Gov. Res. Pract. 4(4): 21:1-21:13 (2023) - [c64]Vrizlynn L. L. Thing:
Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers. CSR 2023: 246-253 - [c63]Randolph Loh, Vrizlynn L. L. Thing:
Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees. CSR 2023: 359-366 - [c62]Ayush Kumar, Vrizlynn L. L. Thing:
Malicious Lateral Movement in 5G Core With Network Slicing And Its Detection. ITNAC 2023: 110-117 - [c61]Ying Zhang, Lilei Zheng, Vrizlynn L. L. Thing, Roger Zimmermann, Bin Guo, Zhiwen Yu:
FaceLivePlus: A Unified System for Face Liveness Detection and Face Verification. ICMR 2023: 144-152 - [c60]Ayush Kumar, Vrizlynn L. L. Thing:
RAPTOR: Advanced Persistent Threat Detection in Industrial IoT via Attack Stage Correlation. PST 2023: 1-12 - [c59]Ayush Kumar, Vrizlynn L. L. Thing:
A Public Key Infrastructure for 5G Service-Based Architecture. TrustCom 2023: 1532-1539 - [i19]Ayush Kumar, Vrizlynn L. L. Thing:
RAPTOR: Advanced Persistent Threat Detection in Industrial IoT via Attack Stage Correlation. CoRR abs/2301.11524 (2023) - [i18]Zihao Wang, Vrizlynn L. L. Thing:
Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms. CoRR abs/2304.03691 (2023) - [i17]Vrizlynn L. L. Thing:
Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers. CoRR abs/2304.03698 (2023) - [i16]Rahul Kale, Vrizlynn L. L. Thing:
Few-shot Weakly-supervised Cybersecurity Anomaly Detection. CoRR abs/2304.07470 (2023) - [i15]Randolph Loh, Vrizlynn L. L. Thing:
Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees. CoRR abs/2305.08335 (2023) - [i14]Ayush Kumar, Vrizlynn L. L. Thing:
A Public Key Infrastructure for 5G Service-Based Architecture. CoRR abs/2309.14659 (2023) - [i13]Ayush Kumar, Vrizlynn L. L. Thing:
Malicious Lateral Movement in 5G Core With Network Slicing And Its Detection. CoRR abs/2312.01681 (2023) - [i12]Balachandar Gowrisankar, Vrizlynn L. L. Thing:
An adversarial attack approach for eXplainable AI evaluation on deepfake detection models. CoRR abs/2312.06627 (2023) - 2022
- [j30]Zihao Wang, Fok Kar Wai, Vrizlynn L. L. Thing:
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study. Comput. Secur. 113: 102542 (2022) - [c58]Vrizlynn L. L. Thing:
IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images with Deep Learning. IEEE Big Data 2022: 6481-6488 - [c57]Rahul Kale, Zhi Lu, Kar-Wai Fok, Vrizlynn L. L. Thing:
A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection. BigDataSecurity/HPSC/IDS 2022: 137-142 - [c56]Zhi Lu, Vrizlynn L. L. Thing:
"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Malware Detector. BigDataSecurity/HPSC/IDS 2022: 194-199 - [c55]Zhi Lu, Vrizlynn L. L. Thing:
PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection. IoTBDS 2022: 37-46 - [i11]Zihao Wang, Kar-Wai Fok, Vrizlynn L. L. Thing:
Machine Learning for Encrypted Malicious Traffic Detection: Approaches, Datasets and Comparative Study. CoRR abs/2203.09332 (2022) - [i10]Zhi Lu, Vrizlynn L. L. Thing:
PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection. CoRR abs/2207.00740 (2022) - [i9]Jonathan W. Z. Lim, Vrizlynn L. L. Thing:
Towards Effective Cybercrime Intervention. CoRR abs/2211.09524 (2022) - [i8]Kar-Wai Fok, Vrizlynn L. L. Thing:
Clustering based opcode graph generation for malware variant detection. CoRR abs/2211.10048 (2022) - [i7]Martin Kodys, Zhi Lu, Kar-Wai Fok, Vrizlynn L. L. Thing:
Intrusion Detection in Internet of Things using Convolutional Neural Networks. CoRR abs/2211.10062 (2022) - [i6]Vrizlynn L. L. Thing:
IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images with Deep Learning. CoRR abs/2211.11565 (2022) - [i5]Randolph Loh, Vrizlynn L. L. Thing:
Data Privacy in Multi-Cloud: An Enhanced Data Fragmentation Framework. CoRR abs/2211.11577 (2022) - [i4]Rahul Kale, Zhi Lu, Kar-Wai Fok, Vrizlynn L. L. Thing:
A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection. CoRR abs/2212.00966 (2022) - 2021
- [j29]Li Zhang, Vrizlynn L. L. Thing:
Three decades of deception techniques in active cyber defense - Retrospect and outlook. Comput. Secur. 106: 102288 (2021) - [c54]Martin Kodys, Zhi Lu, Fok Kar Wai, Vrizlynn L. L. Thing:
Intrusion Detection in Internet of Things using Convolutional Neural Networks. PST 2021: 1-10 - [c53]Randolph Loh, Vrizlynn L. L. Thing:
Data Privacy in Multi-Cloud: An Enhanced Data Fragmentation Framework. PST 2021: 1-5 - [c52]Fok Kar Wai, Vrizlynn L. L. Thing:
Clustering based opcode graph generation for malware variant detection. PST 2021: 1-11 - [i3]Li Zhang, Vrizlynn L. L. Thing:
Three Decades of Deception Techniques in Active Cyber Defense - Retrospect and Outlook. CoRR abs/2104.03594 (2021) - [i2]Zhi Lu, Vrizlynn L. L. Thing:
"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector. CoRR abs/2111.05108 (2021) - 2020
- [j28]Chee Cheun Huang, Chien Eao Lee, Vrizlynn L. L. Thing:
A Novel Video Forgery Detection Model Based on Triangular Polarity Feature Classification. Int. J. Digit. Crime Forensics 12(1): 14-34 (2020)
2010 – 2019
- 2019
- [j27]Li Zhang, Vrizlynn L. L. Thing, Yao Cheng:
A scalable and extensible framework for android malware detection and family attribution. Comput. Secur. 80: 120-133 (2019) - [j26]Lilei Zheng, Ying Zhang, Vrizlynn L. L. Thing:
A survey on image tampering and its detection in real-world photos. J. Vis. Commun. Image Represent. 58: 380-399 (2019) - [c51]Ying Zhang, Lilei Zheng, Yew Yi Lu, Vrizlynn L. L. Thing, Roger Zimmermann:
Coverless Image Steganography Framework with Increased Payload Capacity. ISM 2019: 140-147 - [c50]Le Su, Yao Cheng, Huasong Meng, Vrizlynn L. L. Thing, Zhe Wang, Linghe Kong, Long Cheng:
Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation. SmartBlock 2019: 109-119 - [i1]Yao Cheng, Chang Xu, Daisuke Mashima, Vrizlynn L. L. Thing, Yongdong Wu:
PowerNet: Neural Power Demand Forecasting in Smart Grid. CoRR abs/1904.11979 (2019) - 2018
- [j25]Huasong Meng, Vrizlynn L. L. Thing, Yao Cheng, Zhongmin Dai, Li Zhang:
A survey of Android exploits in the wild. Comput. Secur. 76: 71-91 (2018) - [j24]Ying Zhang, Vrizlynn L. L. Thing:
A semi-feature learning approach for tampered region localization across multi-format images. Multim. Tools Appl. 77(19): 25027-25052 (2018) - [j23]Ido Nevat, Dinil Mon Divakaran, Sai Ganesh Nagarajan, Pengfei Zhang, Le Su, Li Ling Ko, Vrizlynn L. L. Thing:
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic. IEEE/ACM Trans. Netw. 26(1): 131-144 (2018) - [c49]Le Su, Dinil Mon Divakaran, Vrizlynn L. L. Thing:
Privacy preserving IP traceback. ISBA 2018: 1-8 - [c48]Fok Kar Wai, Wee-Yong Lim, Dinil Mon Divakaran, Vrizlynn L. L. Thing:
Predicting vulnerability discovery rate using past versions of a software. SOLI 2018: 220-225 - [c47]Fok Kar Wai, Lilei Zheng, Watt Kwong Wai, Le Su, Vrizlynn L. L. Thing:
Automated Botnet Traffic Detection via Machine Learning. TENCON 2018: 38-43 - [c46]Ying Zhang, Rohit Kumar Dubey, Guang Hua, Vrizlynn L. L. Thing:
Face Spoofing Video Detection Using Spatio-Temporal Statistical Binary Pattern. TENCON 2018: 309-314 - [c45]Chien Eao Lee, Lilei Zheng, Ying Zhang, Vrizlynn L. L. Thing, Ying Yu Chu:
Towards Building a Remote Anti-spoofing Face Authentication System. TENCON 2018: 321-326 - [c44]Li Zhang, Huasong Meng, Vrizlynn L. L. Thing:
Progressive Control Flow Obfuscation for Android Applications. TENCON 2018: 1075-1079 - [c43]Li Zhang, Vrizlynn L. L. Thing:
Assisting Vulnerability Detection by Prioritizing Crashes with Incremental Learning. TENCON 2018: 2080-2085 - [c42]Duc-Phong Le, Huasong Meng, Le Su, Sze Ling Yeo, Vrizlynn L. L. Thing:
BIFF: A Blockchain-based IoT Forensics Framework with Identity Privacy. TENCON 2018: 2372-2377 - [c41]Bing Shun Lim, Sye Loong Keoh, Vrizlynn L. L. Thing:
Autonomous vehicle ultrasonic sensor vulnerability and impact assessment. WF-IoT 2018: 231-236 - 2017
- [j22]Guang Hua, Guoan Bi, Vrizlynn L. L. Thing:
On Practical Issues of Electric Network Frequency Based Audio Forensics. IEEE Access 5: 20640-20651 (2017) - [j21]Dinil Mon Divakaran, Li Ling Ko, Le Su, Vrizlynn L. L. Thing:
REX: Resilient and efficient data structure for tracking network flows. Comput. Networks 118: 37-53 (2017) - [j20]Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L. Thing:
Evidence gathering for network security and forensics. Digit. Investig. 20 Supplement: S56-S65 (2017) - [j19]Lilei Zheng, Ying Zhang, Chien Eao Lee, Vrizlynn L. L. Thing:
Time-of-recording estimation for audio recordings. Digit. Investig. 22 Supplement: S115-S126 (2017) - [j18]Li Ling Ko, Dinil Mon Divakaran, Yung Siang Liau, Vrizlynn L. L. Thing:
Insider threat detection and its future directions. Int. J. Secur. Networks 12(3): 168-187 (2017) - [j17]Long Cheng, Dinil Mon Divakaran, Aloysius Wooi Kiak Ang, Wee-Yong Lim, Vrizlynn L. L. Thing:
FACT: A Framework for Authentication in Cloud-Based IP Traceback. IEEE Trans. Inf. Forensics Secur. 12(3): 604-616 (2017) - [c40]Jung-Jae Kim, Yong Liu, Wee-Yong Lim, Vrizlynn L. L. Thing:
An Empirical Study on Collective Online Behaviors of Extremist Supporters. ADMA 2017: 445-459 - [c39]Yao Cheng, Chang Xu, Daisuke Mashima, Vrizlynn L. L. Thing, Yongdong Wu:
PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network. ADMA 2017: 727-740 - [c38]Lilei Zheng, Ying Zhang, Vrizlynn L. L. Thing:
Understanding multi-layer perceptrons on spatial image steganalysis features. APSIPA 2017: 1035-1039 - [c37]Zhongmin Dai, Tong-Wei Chua, Dinesh Kumar Balakrishnan, Vrizlynn L. L. Thing:
Chat-App Decryption Key Extraction Through Information Flow Analysis. SG-CRC 2017: 3-18 - [c36]Victor Pomponiu, Vrizlynn L. L. Thing:
A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification. SG-CRC 2017: 57-69 - [c35]Chien Eao Lee, Lilei Zheng, Ying Zhang, Vrizlynn L. L. Thing:
Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification. SG-CRC 2017: 129-142 - [c34]Vrizlynn L. L. Thing:
IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach. WCNC 2017: 1-6 - 2016
- [j16]Vivek Balachandran, Sufatrio, Darell J. J. Tan, Vrizlynn L. L. Thing:
Control flow obfuscation for Android applications. Comput. Secur. 61: 72-93 (2016) - [j15]Guang Hua, Jiwu Huang, Yun Q. Shi, Jonathan Goh, Vrizlynn L. L. Thing:
Twenty years of digital audio watermarking - a comprehensive review. Signal Process. 128: 222-242 (2016) - [j14]Long Cheng, Dinil Mon Divakaran, Wee-Yong Lim, Vrizlynn L. L. Thing:
Opportunistic Piggyback Marking for IP Traceback. IEEE Trans. Inf. Forensics Secur. 11(2): 273-288 (2016) - [j13]Guang Hua, Ying Zhang, Jonathan Goh, Vrizlynn L. L. Thing:
Audio Authentication by Exploring the Absolute-Error-Map of ENF Signals. IEEE Trans. Inf. Forensics Secur. 11(5): 1003-1016 (2016) - [j12]Rohit Kumar Dubey, Jonathan Goh, Vrizlynn L. L. Thing:
Fingerprint Liveness Detection From Single Image Using Low-Level Features and Shape Analysis. IEEE Trans. Inf. Forensics Secur. 11(7): 1461-1475 (2016) - [c33]Vrizlynn L. L. Thing, Jiaxi Wu:
Autonomous Vehicle Security: A Taxonomy of Attacks and Defences. iThings/GreenCom/CPSCom/SmartData 2016: 164-170 - [c32]Ying Zhang, Jonathan Goh, Lei Lei Win, Vrizlynn L. L. Thing:
Image Region Forgery Detection: A Deep Learning Approach. SG-CRC 2016: 1-11 - [c31]Dinil Mon Divakaran, Yung Siang Liau, Vrizlynn L. L. Thing:
Accurate in-network file-type classification. SG-CRC 2016: 139-146 - 2015
- [j11]Dinil Mon Divakaran, Le Su, Yung Siang Liau, Vrizlynn L. L. Thing:
SLIC: Self-Learning Intelligent Classifier for network traffic. Comput. Networks 91: 283-297 (2015) - [j10]Sufatrio, Darell J. J. Tan, Tong-Wei Chua, Vrizlynn L. L. Thing:
Securing Android: A Survey, Taxonomy, and Challenges. ACM Comput. Surv. 47(4): 58:1-58:45 (2015) - [j9]Jonathan Goh, Vrizlynn L. L. Thing:
A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection. Int. J. Electron. Secur. Digit. Forensics 7(1): 76-104 (2015) - [j8]Guang Hua, Jonathan Goh, Vrizlynn L. L. Thing:
Time-Spread Echo-Based Audio Watermarking With Optimized Imperceptibility and Robustness. IEEE ACM Trans. Audio Speech Lang. Process. 23(2): 227-239 (2015) - [j7]Guang Hua, Jonathan Goh, Vrizlynn L. L. Thing:
Cepstral Analysis for the Application of Echo-Based Audio Watermark Detection. IEEE Trans. Inf. Forensics Secur. 10(9): 1850-1861 (2015) - [c30]Sufatrio, Tong-Wei Chua, Darell J. J. Tan, Vrizlynn L. L. Thing:
Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments. ESORICS (2) 2015: 355-375 - 2014
- [j6]Guang Hua, Jonathan Goh, Vrizlynn L. L. Thing:
A Dynamic Matching Algorithm for Audio Timestamp Identification Using the ENF Criterion. IEEE Trans. Inf. Forensics Secur. 9(7): 1045-1055 (2014) - [c29]Wee-Yong Lim, Amit Sachan, Vrizlynn L. L. Thing:
Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection. IFIP Int. Conf. Digital Forensics 2014: 3-16 - 2013
- [j5]Yu Chen, Vrizlynn L. L. Thing:
Image content analysis for sector-wise JPEG fragment classification. J. Vis. Commun. Image Represent. 24(7): 857-866 (2013) - [c28]Wee-Yong Lim, Jonathan Goh, Vrizlynn L. L. Thing:
Content-centric Age and Gender Profiling Notebook for PAN at CLEF 2013. CLEF (Working Notes) 2013 - [c27]Vrizlynn L. L. Thing, Zheng Leong Chua:
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation. SEC 2013: 217-230 - [c26]Wee-Yong Lim, Amit Sachan, Vrizlynn L. L. Thing:
A Lightweight Algorithm for Automated Forum Information Processing. Web Intelligence 2013: 121-126 - 2012
- [c25]Hwei-Ming Ying, Vrizlynn L. L. Thing:
An enhanced intelligent forum crawler. CISDA 2012: 1-8 - [c24]Vrizlynn L. L. Thing, Darell J. J. Tan:
Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data. ICICS 2012: 240-251 - [c23]Bai Ying Lei, Vrizlynn L. L. Thing, Yu Chen, Wee-Yong Lim:
Logo Classification with Edge-Based DAISY Descriptor. ISM 2012: 222-228 - [c22]Yu Chen, Vrizlynn L. L. Thing:
Using Low Level Gradient Channels for Computationally Efficient Object Detection and Its Application in Logo Detection. ISM 2012: 229-232 - [c21]Vrizlynn L. L. Thing, Yu Chen, Carmen Cheh:
An Improved Double Compression Detection Method for JPEG Image Forensics. ISM 2012: 290-297 - [c20]Vrizlynn L. L. Thing, Hwei-Ming Ying:
Enhanced Dictionary Based Rainbow Table. SEC 2012: 513-524 - [c19]Amit Sachan, Wee-Yong Lim, Vrizlynn L. L. Thing:
A Generalized Links and Text Properties Based Forum Crawler. Web Intelligence 2012: 113-120 - 2011
- [c18]Vrizlynn L. L. Thing, Tong-Wei Chua, Ming-Lee Cheong:
Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File Carving. CIS 2011: 793-797 - [c17]Yu Chen, Vrizlynn L. L. Thing:
A Noise-Tolerant Enhanced Classification Method for Logo Detection and Brand Classification. FGIT-SecTech 2011: 31-42 - [c16]Vrizlynn L. L. Thing, Wee-Yong Lim, Junming Zeng, Darell J. J. Tan, Yu Chen:
Design of a Modular Framework for Noisy Logo Classification in Fraud Detection. FGIT-SecTech 2011: 53-64 - [c15]Qiming Li, Bilgehan Sahin, Ee-Chien Chang, Vrizlynn L. L. Thing:
Content based JPEG fragmentation point detection. ICME 2011: 1-6 - 2010
- [j4]Vrizlynn L. L. Thing, Kian-Yong Ng, Ee-Chien Chang:
Live memory forensics of mobile phones. Digit. Investig. 7(Supplement): S74-S82 (2010) - [c14]Hwei-Ming Ying, Vrizlynn L. L. Thing:
A Novel Inequality-Based Fragmented File Carving Technique. e-Forensics 2010: 28-39 - [c13]Qiming Li, Alvin Ong, Ponnuthurai N. Suganthan, Vrizlynn L. L. Thing:
A Novel Support Vector Machine Approach to High Entropy Data Fragment Classification. SAISMC 2010: 236-247 - [c12]Hwei-Ming Ying, Vrizlynn L. L. Thing:
Optimal Path Construction for Fragmented File Carving. SAISMC 2010: 248-260 - [c11]Vrizlynn L. L. Thing:
Virtual Expansion of Rainbow Tables. IFIP Int. Conf. Digital Forensics 2010: 243-256
2000 – 2009
- 2009
- [j3]Vrizlynn L. L. Thing, Hwei-Ming Ying:
A novel time-memory trade-off method for password recovery. Digit. Investig. 6(Supplement): S114-S120 (2009) - [j2]Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
Locating network domain entry and exit point/path for DDoS attack traffic. IEEE Trans. Netw. Serv. Manag. 6(3): 163-174 (2009) - [c10]Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
Adaptive response system for distributed denial-of-service attacks. Integrated Network Management 2009: 809-814 - 2008
- [b1]Vrizlynn L. L. Thing:
Adaptive Response System for Distributed Denial-of-Service Attacks. Imperial College London, UK, 2008 - [c9]Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
Network domain entrypoint/path determination for DDoS attacks. NOMS 2008: 57-64 - 2007
- [c8]Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
Non-intrusive IP traceback for DDoS attacks. AsiaCCS 2007: 371-373 - [c7]Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
A Survey of Bots Used for Distributed Denial of Service Attacks. SEC 2007: 229-240 - 2005
- [c6]Vrizlynn L. L. Thing, Henry C. J. Lee, Morris Sloman:
Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme. SEC 2005: 309-326 - 2004
- [j1]Vrizlynn L. L. Thing, Ping Shum, M. K. Rao:
Bandwidth-efficient WDM channel allocation for four-wave mixing-effect minimization. IEEE Trans. Commun. 52(12): 2184-2189 (2004) - 2003
- [c5]Yi Xu, Henry C. J. Lee, Vrizlynn L. L. Thing:
A local mobility agent selection algorithm for mobile networks. ICC 2003: 1074-1079 - [c4]Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma:
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. ICICS 2003: 124-135 - [c3]Vrizlynn L. L. Thing, Henry C. J. Lee, Yi Xu:
Performance Evaluation of Hop-by-Hop Local Mobility Agents Probing for Mobile IPv6. ISCC 2003: 576-581 - [c2]Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi Xu:
On the Issues of IP Traceback for IPv6 and Mobile IPv6. ISCC 2003: 582-587 - 2002
- [c1]Vrizlynn L. L. Thing, Henry C. J. Lee, Yi Xu:
Designs and analysis of local mobility agents discovery, selection and failure detection for Mobile IPv6. MWCN 2002: 465-469
Coauthor Index
aka: Fok Kar Wai
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint