default search action
Carol J. Fung
Person information
- affiliation: Concordia University, Montréal, Canada
- affiliation: Virginia Commonwealth University, Richmond, Computer Science Department
- affiliation: University of Manitoba, Winnipeg, Department of Computer Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j39]Abdollah Jabbari, Carol J. Fung:
A Privacy-Preserving Surveillance Video Sharing Scheme: Storage, Authentication, and Joint Retrieval. J. Netw. Syst. Manag. 33(1): 7 (2025) - 2024
- [j38]Rambod Pakrooh, Abdollah Jabbari, Carol J. Fung:
Deep Learning-Assisted Security and Privacy Provisioning in the Internet of Medical Things Systems: A Survey on Recent Advances. IEEE Access 12: 40610-40621 (2024) - [j37]Jiaxing Qi, Zhongzhi Luan, Shaohan Huang, Carol J. Fung, Hailong Yang:
LogSay: An Efficient Comprehension System for Log Numerical Reasoning. IEEE Trans. Computers 73(7): 1809-1821 (2024) - [j36]Jiaxing Qi, Zhongzhi Luan, Shaohan Huang, Carol J. Fung, Hailong Yang, Depei Qian:
SpikeLog: Log-Based Anomaly Detection via Potential-Assisted Spiking Neuron Network. IEEE Trans. Knowl. Data Eng. 36(12): 9322-9335 (2024) - [j35]Muhammad Ejaz, Jinsong Gui, Muhammad Asim, Mohammed Ahmed El-Affendi, Carol J. Fung, Ahmed A. Abd El-Latif:
RL-Planner: Reinforcement Learning-Enabled Efficient Path Planning in Multi-UAV MEC Systems. IEEE Trans. Netw. Serv. Manag. 21(3): 3317-3329 (2024) - [c73]Y A Joarder, Carol J. Fung:
QUICPro: Integrating Deep Reinforcement Learning to Defend against QUIC Handshake Flooding Attacks. ANRW 2024 - [c72]Mohammad Rasool Momeni, Abdollah Jabbari, Carol J. Fung:
A Privacy-Preserving and Secure Scheme for Online Payment in the Realm of Mobile Commerce. CSR 2024: 367-372 - [c71]Y A Joarder, Carol J. Fung:
QUICwand: A Machine Learning Optimization-Based Hybrid Defense Approach Against QUIC Flooding Attacks. DRCN 2024: 92-99 - [c70]Shaohan Huang, Yi Liu, Jiaxing Qi, Jing Shang, Zhiwen Xiao, Carol J. Fung, Zhihui Wu, Hailong Yang, Zhongzhi Luan, Depei Qian:
Gloss: Guiding Large Language Models to Answer Questions from System Logs. SANER 2024: 91-101 - [i5]Jiaxing Qi, Zhongzhi Luan, Shaohan Huang, Carol J. Fung, Hailong Yang, Depei Qian:
FDLoRA: Personalized Federated Learning of Large Language Model via Dual LoRA Tuning. CoRR abs/2406.07925 (2024) - 2023
- [j34]Shaohan Huang, Yi Liu, Carol J. Fung, He Wang, Hailong Yang, Zhongzhi Luan:
Improving Log-Based Anomaly Detection by Pre-Training Hierarchical Transformers. IEEE Trans. Computers 72(9): 2656-2667 (2023) - [j33]Jiaxing Qi, Zhongzhi Luan, Shaohan Huang, Carol J. Fung, Hailong Yang, Hanlu Li, Danfeng Zhu, Depei Qian:
LogEncoder: Log-Based Contrastive Representation Learning for Anomaly Detection. IEEE Trans. Netw. Serv. Manag. 20(2): 1378-1391 (2023) - [c69]Benjamin Teyssier, Y A Joarder, Carol J. Fung:
An Empirical Approach to Evaluate the Resilience of QUIC Protocol Against Handshake Flood Attacks. CNSM 2023: 1-9 - [c68]Rambod Pakrooh, Abdollah Jabbari, Carol J. Fung:
Optimization of Witness Selection for Ensuring the Integrity of Data in a Blockchain-Assisted Health-IoT System. EUROCON 2023: 514-519 - [c67]Jiaxing Qi, Shaohan Huang, Zhongzhi Luan, Shu Yang, Carol J. Fung, Hailong Yang, Depei Qian, Jing Shang, Zhiwen Xiao, Zhihui Wu:
LogGPT: Exploring ChatGPT for Log-Based Anomaly Detection. HPCC/DSS/SmartCity/DependSys 2023: 273-280 - [c66]Kshitij Kokkera, Aileen Chen, Chythra Malapati, Alex Demchenko, Carol J. Fung:
A Study on the Conspiracy Theory Propagation Network on Twitter. NOMS 2023: 1-9 - [c65]Benjamin Teyssier, Y A Joarder, Carol J. Fung:
QUICShield: A Rapid Detection Mechanism Against QUIC-Flooding Attacks. VCC 2023: 43-48 - [i4]Shaohan Huang, Yi Liu, Carol J. Fung, Jiaxing Qi, Hailong Yang, Zhongzhi Luan:
LogQA: Question Answering in Unstructured Logs. CoRR abs/2303.11715 (2023) - [i3]Jiaxing Qi, Shaohan Huang, Zhongzhi Luan, Carol J. Fung, Hailong Yang, Depei Qian:
LogGPT: Exploring ChatGPT for Log-Based Anomaly Detection. CoRR abs/2309.01189 (2023) - 2022
- [j32]Salman Ahmed, Ya Xiao, Taejoong Chung, Carol J. Fung, Moti Yung, Danfeng Daphne Yao:
Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE. Computer 55(2): 54-62 (2022) - [j31]Rémi Badonnel, Carol J. Fung, Sandra Scott-Hayward, Qi Li, Fulvio Valenza, Cristian Hesselman:
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management. IEEE Trans. Netw. Serv. Manag. 19(3): 2251-2254 (2022) - [j30]Shaozhi Dai, Zhongzhi Luan, Shaohan Huang, Carol J. Fung, He Wang, Hailong Yang, Depei Qian:
REVAL: Recommend Which Variables to Log With Pretrained Model and Graph Neural Network. IEEE Trans. Netw. Serv. Manag. 19(4): 4045-4057 (2022) - [c64]Salman Ahmed, Ya Xiao, Taejoong (Tijay) Chung, Carol J. Fung, Moti Yung, Danfeng (Daphne) Yao:
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE. AsiaCCS 2022: 1210-1212 - [c63]Shaohan Huang, Yi Liu, Carol J. Fung, Hailong Yang, Zhongzhi Luan:
Black-box Attacks to Log-based Anomaly Detection. CNSM 2022: 310-316 - [c62]Carol J. Fung, Vivian Motti, Katie Zhang, Yanjun Qian:
A Study of User Concerns about Smartphone Privacy. CSNet 2022: 1-8 - [c61]Y A Joarder, Carol J. Fung:
A Survey on the Security Issues of QUIC. CSNet 2022: 1-8 - [c60]Maher Al Islam, Carol J. Fung, Ashraf Tantawy, Sherif Abdelwahed:
A Game-Theoretic Model for DDoS Mitigation Strategies with Cloud Services. NOMS 2022: 1-5 - [c59]Jiaxing Qi, Zhongzhi Luan, Shaohan Huang, Yukun Wang, Carol J. Fung, Hailong Yang, Depei Qian:
Adanomaly: Adaptive Anomaly Detection for System Logs with Adversarial Learning. NOMS 2022: 1-5 - 2021
- [j29]Alexandra Sosnkowski, Carol J. Fung, Shivram Ramkumar:
An analysis of Twitter users' long term political view migration using cross-account data mining. Online Soc. Networks Media 26: 100177 (2021) - [j28]Rémi Badonnel, Carol J. Fung, Sandra Scott-Hayward, Qi Li, Jie Zhang, Cristian Hesselman:
Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services. IEEE Trans. Netw. Serv. Manag. 18(2): 1120-1124 (2021) - [c58]Mostafa Zaman, Maher Al Islam, Ashraf Tantawy, Carol J. Fung, Sherif Abdelwahed:
Adaptive Control for Smart Water Distribution Systems. ISC2 2021: 1-6 - [i2]Salman Ahmed, Ya Xiao, Taejoong Chung, Carol J. Fung, Moti Yung, Danfeng Yao:
Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE. CoRR abs/2111.08842 (2021) - 2020
- [j27]Ilsun You, Giovanni Pau, Wei Wei, Carol J. Fung:
IEEE Access Special Section Editorial: Green Communications on Wireless Networks. IEEE Access 8: 187140-187145 (2020) - [j26]Rémi Badonnel, Carol J. Fung, Qi Li, Sandra Scott-Hayward:
Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems. IEEE Trans. Netw. Serv. Manag. 17(1): 12-14 (2020) - [j25]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Wojciech Mazurczyk, Carol J. Fung, Salvador E. Venegas-Andraca:
Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario. IEEE Trans. Netw. Serv. Manag. 17(1): 118-131 (2020) - [j24]Hui Yu, Jiahai Yang, Carol J. Fung:
Fine-Grained Cloud Resource Provisioning for Virtual Network Function. IEEE Trans. Netw. Serv. Manag. 17(3): 1363-1376 (2020) - [j23]Shaohan Huang, Yi Liu, Carol J. Fung, Rong He, Yining Zhao, Hailong Yang, Zhongzhi Luan:
HitAnomaly: Hierarchical Transformers for Anomaly Detection in System Log. IEEE Trans. Netw. Serv. Manag. 17(4): 2064-2076 (2020) - [c57]Carol J. Fung, Bill McCormick:
An Effective Policy Sharing Mechanism for Smart Home Networks. CNSM 2020: 1-7 - [c56]Shaohan Huang, Yi Liu, Carol J. Fung, Rong He, Yining Zhao, Hailong Yang, Zhongzhi Luan:
Transfer Log-based Anomaly Detection with Pseudo Labels. CNSM 2020: 1-5 - [c55]Shaohan Huang, Yi Liu, Carol J. Fung, Wanhe An, Rong He, Yining Zhao, Hailong Yang, Zhongzhi Luan:
A Gated Few-shot Learning Model For Anomaly Detection. ICOIN 2020: 505-509 - [c54]Carol J. Fung, Yadunandan Pillai:
A Privacy-Aware Collaborative DDoS Defence Network. NOMS 2020: 1-5 - [c53]Shaohan Huang, Yi Liu, Carol J. Fung, Rong He, Yining Zhao, Hailong Yang, Zhongzhi Luan:
Paddy: An Event Log Parsing Approach using Dynamic Dictionary. NOMS 2020: 1-8
2010 – 2019
- 2019
- [j22]Carol J. Fung, Jérôme François, Weverton Cordeiro, Mohamed Faten Zhani:
Advanced security management. Int. J. Netw. Manag. 29(3) (2019) - [j21]Carol J. Fung, Bahman Rashidi, Vivian Genaro Motti:
Multi-View Permission Risk Notification for Smartphone System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(1): 42-57 (2019) - [j20]A. H. M. Jakaria, Mohammad Ashiqur Rahman, Carol J. Fung:
A Requirement-Oriented Design of NFV Topology by Formal Synthesis. IEEE Trans. Netw. Serv. Manag. 16(4): 1739-1753 (2019) - [c52]Lu Xu, Zhongzhi Luan, Carol J. Fung, Da Ye, Depei Qian:
Anomaly Detection Models Based on Context-Aware Sequential Long Short-Term Memory Learning. GLOBECOM 2019: 1-6 - [c51]Bill McCormick, Hassan Halabian, Carol J. Fung:
Distributed Orchestration in Cloud Data Centers. IM 2019: 346-352 - [c50]Jun Xu, Carol J. Fung:
A Risk-defined Trust Transitivity Model for Group Decisions in Social Networks. IM 2019: 415-420 - [c49]Pulkit Rustgi, Carol J. Fung:
Demo: DroidNet - An Android Permission Control Recommendation System Based on Crowdsourcing. IM 2019: 737-738 - [e1]Joe Betser, Carol J. Fung, Alex Clemm, Jérôme François, Shingo Ata:
IFIP/IEEE International Symposium on Integrated Network Management, IM 2019, Washington, DC, USA, April 09-11, 2019. IFIP 2019, ISBN 978-3-903176-15-7 [contents] - 2018
- [j19]Ilsun You, Carol J. Fung, Joonsang Baek, Victor C. M. Leung:
IEEE Access Special Section Editorial: Security and Privacy in Applications and Services for Future Internet of Things. IEEE Access 6: 39398-39400 (2018) - [j18]Carol J. Fung, Mohamed Faten Zhani, Weverton Cordeiro, Jérôme François:
Special issue on security for emerging open networking technologies. Int. J. Netw. Manag. 28(1) (2018) - [j17]Bahman Rashidi, Carol J. Fung, Anh Nguyen, Tam Vu, Elisa Bertino:
Android User Privacy Preserving Through Crowdsourcing. IEEE Trans. Inf. Forensics Secur. 13(3): 773-787 (2018) - [c48]Lu Xu, Zhongzhi Luan, Carol J. Fung, Guang Wei, Depei Qian:
Outlier Detection for Distributed Services using Multi-Frequency Patterns. CNSM 2018: 308-312 - [c47]Hui Yu, Jiahai Yang, Carol J. Fung:
Elastic Network Service Chain with Fine-Grained Vertical Scaling. GLOBECOM 2018: 1-7 - [c46]Hui Yu, Jiahai Yang, Carol J. Fung, Raouf Boutaba, Yi Zhuang:
ENSC: Multi-Resource Hybrid Scaling for Elastic Network Service Chain in Clouds. ICPADS 2018: 34-41 - [c45]Bahman Rashidi, Carol J. Fung, Kevin W. Hamlen, Andrzej Kamisinski:
HoneyV: A virtualized honeynet system based on network softwarization. NOMS 2018: 1-5 - [c44]Bahman Rashidi, Carol J. Fung, Mohammad Ashiqur Rahman:
A scalable and flexible DDoS mitigation system using network function virtualization. NOMS 2018: 1-6 - 2017
- [j16]Bahman Rashidi, Carol J. Fung, Elisa Bertino:
Android resource usage risk assessment using hidden Markov model and online learning. Comput. Secur. 65: 90-107 (2017) - [j15]Bahman Rashidi, Carol J. Fung, Elisa Bertino:
A Collaborative DDoS Defence Framework Using Network Function Virtualization. IEEE Trans. Inf. Forensics Secur. 12(10): 2483-2497 (2017) - [c43]Shaohan Huang, Carol J. Fung, Chang Liu, Shupeng Zhang, Guang Wei, Zhongzhi Luan, Depei Qian:
Arena: Adaptive real-time update anomaly prediction in cloud systems. CNSM 2017: 1-9 - [c42]A. H. M. Jakaria, Mohammad Ashiqur Rahman, Carol J. Fung:
Automated synthesis of NFV topology: A security requirement-oriented design. CNSM 2017: 1-5 - [c41]Bahman Rashidi, Carol J. Fung, Elisa Bertino:
Android malicious application detection using support vector machine and active learning. CNSM 2017: 1-9 - [c40]A. H. M. Jakaria, Bahman Rashidi, Mohammad Ashiqur Rahman, Carol J. Fung, Wei Yang:
Dynamic DDoS Defense Resource Allocation using Network Function Virtualization. SDN-NFV@CODASPY 2017: 37-42 - [c39]Seyyit Alper Sert, Carol J. Fung, Roy George, Adnan Yazici:
An efficient fuzzy path selection approach to mitigate selective forwarding attacks in wireless sensor networks. FUZZ-IEEE 2017: 1-6 - [c38]Pulkit Rustgi, Carol J. Fung, Bahman Rashidi, Bridget T. McInnes:
DroidVisor: An Android secure application recommendation system. IM 2017: 1071-1076 - [c37]Shupeng Zhang, Carol J. Fung, Shaohan Huang, Zhongzhi Luan, Depei Qian:
PSOM: Periodic Self-Organizing Maps for unsupervised anomaly detection in periodic time series. IWQoS 2017: 1-6 - 2016
- [j14]Carol J. Fung, Quanyan Zhu:
FACID: A trust-based collaborative decision framework for intrusion detection networks. Ad Hoc Networks 53: 17-31 (2016) - [j13]Molka Gharbaoui, Barbara Martini, Carol J. Fung, Francesco Paolucci, Alessio Giorgetti, Piero Castoldi:
An incentive-compatible and trust-aware multi-provider path computation element (PCE). Comput. Networks 108: 40-54 (2016) - [j12]Bahman Rashidi, Carol J. Fung, Tam Vu:
Android fine-grained permission control system with real-time expert recommendations. Pervasive Mob. Comput. 32: 62-77 (2016) - [c36]Bahman Rashidi, Carol J. Fung:
XDroid: An Android permission control using Hidden Markov chain and online learning. CNS 2016: 46-54 - [c35]Bahman Rashidi, Carol J. Fung:
CoFence: A collaborative DDoS defence using network function virtualization. CNSM 2016: 160-166 - [c34]A. H. M. Jakaria, Wei Yang, Bahman Rashidi, Carol J. Fung, Mohammad Ashiqur Rahman:
VFence: A Defense against Distributed Denial of Service Attacks Using Network Function Virtualization. COMPSAC Workshops 2016: 431-436 - [c33]Bahman Rashidi, Carol J. Fung, Anh Nguyen, Tam Vu:
Android Permission Recommendation Using Transitive Bayesian Inference Model. ESORICS (1) 2016: 477-497 - [c32]Hui Yu, Jiahai Yang, Carol J. Fung:
SpongeNet+: A Two-Layer Bandwidth Allocation Framework for Cloud Datacenter. HPCC/SmartCity/DSS 2016: 86-93 - [c31]Shaohan Huang, Carol J. Fung, Kui Wang, Polo Pei, Zhongzhi Luan, Depei Qian:
Using recurrent neural networks toward black-box system anomaly prediction. IWQoS 2016: 1-10 - [c30]Wei Yang, Carol J. Fung:
A survey on security in network functions virtualization. NetSoft 2016: 15-19 - [c29]Bahman Rashidi, Carol J. Fung:
BotTracer: Bot user detection using clustering method in RecDroid. NOMS 2016: 1239-1244 - 2015
- [j11]Carol J. Fung, Weverton Cordeiro:
Guest Editorial: Special issue on Next Generation Networks and Systems Security. J. Internet Serv. Inf. Secur. 5(2): 1-3 (2015) - [j10]Bahman Rashidi, Carol J. Fung:
Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model. J. Internet Serv. Inf. Secur. 5(2): 33-46 (2015) - [j9]Bahman Rashidi, Carol J. Fung:
A Survey of Android Security Threats and Defenses. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(3): 3-35 (2015) - [c28]Huanhuan Zhang, Jie Zhang, Carol J. Fung, Chang Xu:
Improving Sybil Detection via Graph Pruning and Regularization Techniques. ACML 2015: 189-204 - [c27]Shaohan Huang, Carol J. Fung, Kui Wang, Yaqi Yang, Zhongzhi Luan, Depei Qian:
Revisit network anomaly ranking in datacenter network using re-ranking. CloudNet 2015: 178-183 - [c26]Carol J. Fung, Bill McCormick:
VGuard: A distributed denial of service attack mitigation method using network function virtualization. CNSM 2015: 64-70 - [c25]Lei Wei, Carol J. Fung:
FlowRanger: A request prioritizing algorithm for controller DoS attacks in Software Defined Networks. ICC 2015: 5254-5259 - [c24]Bahman Rashidi, Carol J. Fung, Tam Vu:
Dude, ask the experts!: Android resource access permission recommendation with RecDroid. IM 2015: 296-304 - [c23]Ioana-Alexandra Bara, Carol J. Fung, Thang N. Dinh:
Enhancing Twitter spam accounts discovery using cross-account pattern mining. IM 2015: 491-496 - [c22]Bahman Rashidi, Carol J. Fung:
A game-theoretic model for defending against malicious users in RecDroid. IM 2015: 1339-1344 - [c21]Kui Wang, Carol J. Fung, Chao Ding, Polo Pei, Shaohan Huang, Zhongzhi Luan, Depei Qian:
A methodology for root-cause analysis in component based systems. IWQoS 2015: 243-248 - [c20]Bahman Rashidi, Carol J. Fung, Gerrit Bond, Steven Jackson, Marcus Pare, Tam Vu:
Demo: RecDroid: An Android Resource Access Permission Recommendation System. MobiHoc 2015: 403-404 - [c19]Andrzej Kamisinski, Carol J. Fung:
FlowMon: Detecting Malicious Switches in Software-Defined Networks. SafeConfig@CCS 2015: 39-45 - 2014
- [c18]Carol J. Fung, Barbara Martini, Molka Gharbaoui, Francesco Paolucci, Alessio Giorgetti, Piero Castoldi:
Quality of interaction among path computation elements for trust-aware inter-provider cooperation. ICC 2014: 677-682 - [c17]Bahman Rashidi, Carol J. Fung, Tam Vu:
RecDroid: a resource access permission control portal and recommendation service for smartphone users. SPME@MobiCom 2014: 13-18 - [c16]Carol J. Fung, Disney Yan Lam, Raouf Boutaba:
RevMatch: An efficient and robust decision model for collaborative malware detection. NOMS 2014: 1-9 - 2013
- [b2]Carol J. Fung, Raouf Boutaba:
Intrusion Detection Networks - A Key to Collaborative Security. CRC Press 2013, ISBN 978-1-466-56412-1, pp. I-XXII, 1-239 - [b1]Carol J. Fung:
Design and Management of Collaborative Intrusion Detection Networks. University of Waterloo, Ontario, Canada, 2013 - [c15]Carol J. Fung, Raouf Boutaba:
Design and management of collaborative intrusion detection networks. IM 2013: 955-961 - 2012
- [j8]Quanyan Zhu, Carol J. Fung, Raouf Boutaba, Tamer Basar:
GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks. IEEE J. Sel. Areas Commun. 30(11): 2220-2230 (2012) - [j7]Carol J. Fung, Jie Zhang, Raouf Boutaba:
Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks. IEEE Trans. Netw. Serv. Manag. 9(3): 320-332 (2012) - 2011
- [j6]Carol J. Fung, Jie Zhang, Issam Aib, Raouf Boutaba:
Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection. J. Netw. Syst. Manag. 19(2): 257-277 (2011) - [j5]Carol J. Fung:
Collaborative Intrusion Detection Networks and Insider Attacks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(1): 63-74 (2011) - [j4]Carol J. Fung, Jie Zhang, Issam Aib, Raouf Boutaba:
Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks. IEEE Trans. Netw. Serv. Manag. 8(2): 79-91 (2011) - [c14]Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar:
Poster: SMURFEN: a rule sharing collaborative intrusion detection network. CCS 2011: 761-764 - [c13]Quanyan Zhu, Carol J. Fung, Raouf Boutaba, Tamer Basar:
A game-theoretic approach to rule sharing mechanism in networked intrusion detection systems: Robustness, incentives and security. CDC/ECC 2011: 243-248 - [c12]Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar:
SMURFEN: A system framework for rule sharing collaborative intrusion detection. CNSM 2011: 1-6 - 2010
- [c11]Carol J. Fung, Jie Zhang, Raouf Boutaba:
Effective acquaintance management for Collaborative Intrusion Detection Networks. CNSM 2010: 158-165 - [c10]Quanyan Zhu, Carol J. Fung, Raouf Boutaba, Tamer Basar:
A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks. ICC 2010: 1-6 - [c9]Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar:
Bayesian decision aggregation in collaborative intrusion detection networks. NOMS 2010: 349-356 - [i1]Quanyan Zhu, Carol J. Fung, Raouf Boutaba, Tamer Basar:
A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks. CoRR abs/1002.3190 (2010)
2000 – 2009
- 2009
- [c8]Quanyan Zhu, Carol J. Fung, Raouf Boutaba, Tamer Basar:
A game-theoretical approach to incentive design in collaborative intrusion detection networks. GAMENETS 2009: 384-392 - [c7]Carol J. Fung, Jie Zhang, Issam Aib, Raouf Boutaba:
Robust and scalable trust management for collaborative intrusion detection. Integrated Network Management 2009: 33-40 - 2008
- [c6]Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, Raouf Boutaba:
Trust Management for Host-Based Collaborative Intrusion Detection. DSOM 2008: 109-122 - [c5]Carol J. Fung, Yanni Ellen Liu:
Lifetime Estimation of Large IEEE 802.15.4 Compliant Wireless Sensor Networks. MASCOTS 2008: 363-366 - 2007
- [j3]Jelena V. Misic, Carol J. Fung:
The impact of master-slave bridge access mode on the performance of multi-cluster 802.15.4 network. Comput. Networks 51(10): 2411-2449 (2007) - 2006
- [j2]Jelena V. Misic, Vojislav B. Misic, Carol J. Fung:
Interconnecting 802.15.4 Clusters in Master-slave Mode Using Guaranteed Time Slots and Acknowledged Transfers: Queueing Theoretic Analysis. J. Interconnect. Networks 7(1): 117-132 (2006) - [j1]Jelena V. Misic, Vojislav B. Misic, Carol J. Fung, Shairmina Shafi:
Faster Lanes, Longer Lifetimes: Activity Management in Interconnected 802.15.4 Sensor Clusters. Mob. Networks Appl. 11(5): 741-756 (2006) - [c4]Jelena V. Misic, Carol J. Fung, Vojislav B. Misic:
On Bridge Residence Times in Master-Slave Connected 802.15.4 Clusters. AINA (2) 2006: 286-290 - [c3]Jelena V. Misic, Carol J. Fung, Vojislav B. Misic:
On Node Population in a Multi-Level 802.15.4 Sensor Network. GLOBECOM 2006 - [c2]Jelena V. Misic, Carol J. Fung, Vojislav B. Misic:
Interconnecting 802.15.4 clusters in slotted CSMA-CA mode. ICC 2006: 2101-2106 - [c1]Jelena V. Misic, Carol J. Fung, Vojislav B. Misic:
Network lifetime equalization in interconnected 802.15.4 clusters. QSHINE 2006: 15
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint