Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves and Peng Ning. Tracing Traffic through Intermediate Hosts that Repacketize Flows. In Proceedings of the 26th Annual IEEE Conference on Computer Communications (Infocom 2007). May 2007.
Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang and Zhao Zhang. WormTerminator: An Effective Containment of Unknown and Polymorphic Fast Spreading Worms. In Proceedings of the 2nd ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS 2006). December 2006.
Xinyuan Wang. The Loop Fallacy and Deterministic Serialization in Tracing Intrusion Connections through Stepping Stones. In International Journal of Security and Networks, 1(3/4) , 2006.
Shiping Chen, Xinyuan Wang and Sushil Jajodia. On the Anonymity and Traceability of Peer-to-Peer VoIP Calls. In IEEE Network Special Issue on Securing Voice over IP, 20(5):32-37, September 2006.
Pai Peng, Peng Ning, Douglas S. Reeves and Xinyuan Wang. Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. In Proceedings of the 2nd International Workshop on Security in Distributed Computing Systems (SDCS-2005), June, 2005.
Xinyuan Wang. The Loop Fallacy and Serialization In Tracing Intrusion Connections through Stepping Stones. In Proceedings of the 19th ACM Symposium on Applied Computing (SAC2004 Track on Computer Security), March, 2004.
Copyright Note: The electronic versions of the published papers are made available here to facilitate timely dissemination of knowledge and findings of scholarly and technical works. Copyright and all rights therein are retained by authors and/or by other copyright holders. In most cases, these papers may not be reposted or redistributed without explicit permission from the copyright holders