Publications - 2006

1. Jianhua Yang, Shou-Hsuan Stephen Huang, Ming Dong Wan, "A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip
Time for Intrusion Detection," pp. 231-236, 2006.
2. Ming Dong Wan, Shou-Hsuan Stephen Huang, Jianhua Yang, "Finding the Longest Similar Subsequence of Thumbprints for Intrusion
Detection," pp. 255-262, 2006.
3. Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang, "Resistance Analysis to Intruders' Evasion of Detecting Intrusion,"
ISC : 383-397, 2006.
4. UH-CS-06-14 Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang, "Stepping-Stone Detection via Request-Response Traffic Analysis," December 04, 2006.
5. Ernst L. Leiss, "Protecting Digital Content," Proc. IFIP, IFIP World Computing Congress, Security Stream, Santiago, Chile,
pp. 20-25, August 2006.
6. Babu Sundaram, "Design and Implementation of a Credential Revocation System for Grids," Doctoral Dissertation, PDF Copy.
7. Jianhua Yang, "Detecting and Preventing Stepping-Stone Intrusion by Monitoring Network Packets," Doctoral Dissertation, PDF Copy.

8. Sumit Gupta, "Automated Detection of DOS Routing Attacks in Wireless Sensor Networks," Master Thesis, Abstract.