Index of /~tmchen/papers

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory   -  
[   ]talk-rockwell-May200..>2010-11-29 19:44 115K 
[   ]talk-lmu-Oct2004.pdf 2010-11-29 19:44 349K 
[   ]talk-lmu-Nov2004.pdf 2010-11-29 19:44 260K 
[   ]talk-lmu-Dec2004.pdf 2010-11-29 19:44 1.6M 
[   ]talk-computer-Oct200..>2010-11-29 19:43 220K 
[   ]talk-bupt-worms-Aug2..>2010-11-29 19:43 311K 
[   ]talk-bupt-ids-Aug200..>2010-11-29 19:43 4.1M 
[   ]talk-bupt-ddos-Aug20..>2010-11-29 19:42 356K 
[   ]talk-bt-Nov2004.pdf 2010-11-29 19:42 289K 
[   ]statmethods2004.pdf 2010-11-29 19:42 133K 
[   ]privacy.pdf 2010-11-29 19:41 323K 
[   ]phisherman.pdf 2010-11-29 19:41 2.4M 
[   ]patent6097699.pdf 2010-11-29 19:40 1.8M 
[   ]patent5793976.pdf 2010-11-29 19:40 1.5M 
[   ]overview-attacks.pdf 2010-11-29 19:39 583K 
[   ]network-worms.pdf 2010-11-29 19:37 149K 
[   ]mwscas2003.pdf 2010-11-29 19:37 1.1M 
[   ]mobile-malware.pdf 2010-11-29 19:37 395K 
[   ]malicious-software.pdf 2010-11-29 19:37 360K 
[   ]iscc2004.pdf 2010-11-29 19:36 448K 
[   ]intrusion-detection-..>2010-11-29 19:36 107K 
[   ]intrusion-detection-..>2010-11-29 19:36 197K 
[   ]internet-computing-n..>2010-11-29 19:36 191K 
[   ]info-sec-risks.pdf 2010-11-29 19:36 221K 
[   ]info-sec-ethics.pdf 2010-11-29 19:36 784K 
[   ]iec2006.pdf 2010-11-29 19:35 142K 
[   ]iec2005.pdf 2010-11-29 19:35 101K 
[   ]iec2004.pdf 2010-11-29 19:35 92K 
[   ]icccn03.pdf 2010-11-29 19:35 199K 
[   ]icc2004-yi.pdf 2010-11-29 19:35 295K 
[   ]icc2004-hanem.pdf 2010-11-29 19:35 342K 
[   ]icc07-nasir.pdf 2010-11-29 19:35 145K 
[   ]icc06-nasir.pdf 2010-11-29 19:35 355K 
[   ]icc06-jungwon.pdf 2010-11-29 19:34 165K 
[   ]hcn-traffic-modeling..>2010-11-29 19:34 1.7M 
[   ]hcn-traffic-manageme..>2010-11-29 19:34 457K 
[   ]handbook2005.pdf 2010-11-29 19:34 1.9M 
[   ]globecom06.pdf 2010-11-29 19:33 259K 
[   ]evolution-viruses.pdf 2010-11-29 19:33 165K 
[   ]encyclopedia-chap.pdf 2010-11-29 19:33 67K 
[   ]electronic-attacks.pdf 2010-11-29 19:33 340K 
[   ]ee-10-11-05.pdf 2010-11-29 19:32 511K 
[   ]ee-2-16-05.pdf 2010-11-29 19:33 3.0M 
[   ]dig-forensics06.pdf 2010-11-29 19:32 385K 
[   ]commag2002.pdf 2010-11-29 19:30 217K 
[   ]circuits-to-IP.pdf 2010-11-29 19:30 206K 
[   ]chinacom_aug06.pdf 2010-11-29 19:30 352K 
[   ]authentication-and-p..>2010-11-29 19:29 156K 
[   ]TransCom_Sept1994.pdf 2010-11-29 19:44 839K 
[   ]SPIE_Nov2000.pdf 2010-11-29 19:42 889K 
[   ]SIAM_June1995.pdf 2010-11-29 19:41 884K 
[   ]ProcIEEE-Aug2002.pdf 2010-11-29 19:41 253K 
[   ]Network_Sept1996.pdf 2010-11-29 19:39 77K 
[   ]Network_March1998.pdf 2010-11-29 19:39 77K 
[   ]Network_July1994.pdf 2010-11-29 19:39 6.1M 
[   ]JSAC_May2002.pdf 2010-11-29 19:36 256K 
[   ]JSAC_June1989.pdf 2010-11-29 19:36 959K 
[   ]IPOM2002_Oct2002.pdf 2010-11-29 19:36 398K 
[   ]IM2001_May2001.pdf 2010-11-29 19:35 642K 
[   ]IEICETransCom_Nov199..>2010-11-29 19:35 371K 
[   ]HPSR2001_May2001.pdf 2010-11-29 19:34 135K 
[   ]Globecom2000_Nov2000..>2010-11-29 19:33 64K 
[   ]Computer_Jun2004.pdf 2010-11-29 19:32 145K 
[   ]ComMag_May1996.pdf 2010-11-29 19:31 3.2M 
[   ]ComMag_March2000.pdf 2010-11-29 19:30 42K 
[   ]ComMag_Jun1988.pdf 2010-11-29 19:30 1.1M 
[   ]ComMag_Dec1999.pdf 2010-11-29 19:30 733K 
[   ]Cisco IPJ_sep2003.pdf 2010-11-29 19:30 165K 
[   ]CACM_Jan2001.pdf 2010-11-29 19:30 907K 
[   ]BSS99_June1999.pdf 2010-11-29 19:29 149K 
[   ]AAP_Jun1989.pdf 2010-11-29 19:29 80K