23 results on '"Cho-Yu Jason Chiang"'
Search Results
2. A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses.
3. VulnerVAN: A Vulnerable Network Generation Tool.
4. Limitations of the Lipschitz Constant as a Defense Against Adversarial Examples.
5. Towards the Development of Robust Deep Neural Networks in Adversarial Settings.
6. On Defensive Cyber Deception: A Case Study Using SDN.
7. On Detecting Manifestation of Adversary Characteristics.
8. Measuring the Effectiveness of Network Deception.
9. Enabling reproducible cyber research - four labeled datasets.
10. CyberVAN: A Cyber Security Virtual Assured Network testbed.
11. ACyDS: An adaptive cyber deception system.
12. Building an operation support system for a fast reconfigurable network experimentation testbed.
13. GNU Radio-Based Digital Communications: Computational Analysis of a GMSK Transceiver.
14. Criticality avoidance: A new paradigm for congestion control based on science of phase transition.
15. Storage Deduplication and Management for Application Testing over a Virtual Network Testbed.
16. Storage deduplication for Virtual Ad Hoc Network testbed by File-level Block Sharing.
17. Virtual ad hoc network testbeds for network-aware applications.
18. Enabling Distributed Management for Dynamic Airborne Networks.
19. An integrated testbed for Virtual Ad Hoc Networks.
20. On Automated Policy Generation for Mobile Ad Hoc Networks.
21. Policy-Based Mobile Ad Hoc Network Management.
22. DRAMA: Distributed Policy Management for MANETs.
23. Agent-based policy-enabled network management architecture for mobile ad hoc networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.