57 results on '"Cho-Yu Jason Chiang"'
Search Results
2. A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses.
3. VulnerVAN: A Vulnerable Network Generation Tool.
4. Limitations of the Lipschitz Constant as a Defense Against Adversarial Examples.
5. Towards the Development of Robust Deep Neural Networks in Adversarial Settings.
6. On Defensive Cyber Deception: A Case Study Using SDN.
7. On Detecting Manifestation of Adversary Characteristics.
8. Measuring the Effectiveness of Network Deception.
9. Enabling reproducible cyber research - four labeled datasets.
10. CyberVAN: A Cyber Security Virtual Assured Network testbed.
11. ACyDS: An adaptive cyber deception system.
12. Building an operation support system for a fast reconfigurable network experimentation testbed.
13. GNU Radio-Based Digital Communications: Computational Analysis of a GMSK Transceiver.
14. Criticality avoidance: A new paradigm for congestion control based on science of phase transition.
15. Storage Deduplication and Management for Application Testing over a Virtual Network Testbed.
16. DeBot: A novel network-based mechanism to detect exfiltration by architectural stealthy botnets.
17. Storage deduplication for Virtual Ad Hoc Network testbed by File-level Block Sharing.
18. Virtual ad hoc network testbeds for network-aware applications.
19. Enabling Distributed Management for Dynamic Airborne Networks.
20. An integrated testbed for Virtual Ad Hoc Networks.
21. On Automated Policy Generation for Mobile Ad Hoc Networks.
22. Policy-Based Mobile Ad Hoc Network Management.
23. A virtual ad hoc network testbed.
24. DRAMA: Distributed Policy Management for MANETs.
25. On Optimal Deadlock Detection Scheduling.
26. On Optimal Deadlock Detection Scheduling
27. On optimal deadlock detection scheduling
28. A Framework for Studying Autonomic Computing Models in Cyber Deception
29. Generating targeted e-mail at scale using neural machine translation
30. Limitations of the Lipschitz Constant as a Defense Against Adversarial Examples
31. Towards the Development of Robust Deep Neural Networks in Adversarial Settings
32. Enabling reproducible cyber research - four labeled datasets
33. TITAN: Integrated network management in tactical mobile ad hoc networks
34. Building an operation support system for a fast reconfigurable network experimentation testbed
35. A GNU-based packet radio for network management field testing
36. Storage Deduplication and Management for Application Testing over a Virtual Network Testbed
37. Mission-driven tactical network management
38. Realistic modeling of tactical networks with multi-level security in VAN testbeds
39. On Optimal Deadlock Detection Scheduling
40. Issues with and approaches to network monitoring and problem remediation in military tactical networks
41. Building a versatile testbed for supporting testing and evaluation of tactical network management tools and their interoperability
42. Cross-layer QOS design: Overcoming QOS-unaware slot allocation
43. Integrated Network Operations for Future Army Tactical Networks
44. Performance Analysis of Drama: A Distributed Policy-Based System for Manet Management
45. AMS: an adaptive middleware system for wireless ad hoc networks
46. Novel software agent framework with embedded policy control
47. Generic protocol for network management data collection and dissemination
48. Agent-based policy-enabled network management architecture for mobile ad hoc networks
49. Presence management in next-generation networks
50. A virtual ad hoc network testbed
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.