Publications - 2007

1. Han-Ching Wu, Shou-Hsuan Stephen Huang, "Detecting Stepping-Stone with Chaff Perturbations," AINA Workshops (1), pp: 85-90, 2007.
2. Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang, "Stepping-Stone Detection Via Request-Response Traffic Analysis," ATC, pp. 276-285, 2007.
3. Ying-Wei Kuo, Shou-Hsuan Stephen Huang, "Stepping-stone detection algorithm based on order preserving mapping," ICPADS, pp. 1-8, 2007.
4. Jianhua Yang, Shou-Hsuan Stephen Huang, "Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection," Computers & Security 26(2), pp.137-144, 2007.
5. Jianhua Yang, Shou-Hsuan Stephen Huang, "Mining TCP/IP packets to detect stepping-stone intrusion," Computers & Security 26(7-8), pp. 479-484, 2007.
6. UH-CS-07-04 Zhiyao Liang and Rakesh M. Verma, "Secrecy Checking of Protocols: Solution of an Open Problem," April 9, 2007.
7. Liang, Z. and R. M. Verma, "Secrecy Checking of Protocols: Solution of an Open Problem," Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis, July 2007. PDF Copy.
8. Jianhua Yang, "Network Intrusion Detection," Doctoral Dessertation, PDF Copy.
9. Dvijesh Shastri, "Stress Quantification on the Face and Its Application to Lie Detection," Doctoral Dissertation, PDF Copy.
10. Pradeep Buddharaju, "Physiology-Based Face Recognition in the Thermal Infrared Spectrum," Doctoral Dissertation, PDF Copy.

11. James R. Thigpen, "Photometric Calibration for Quantitative Spectral Microscopy under Transmitted Illumination," Master Thesis, Abstract.