Weiqing Sun
Weiqing Sun
Verified email at - Homepage
Cited by
Cited by
A deep learning approach for network intrusion detection system
A Javaid, Q Niyaz, W Sun, M Alam
Proceedings of the 9th EAI International Conference on Bio-inspired …, 2016
Distributed intrusion detection system in a multi-layer network architecture of smart grids
Y Zhang, L Wang, W Sun, RC Green II, M Alam
IEEE Transactions on Smart Grid 2 (4), 796-808, 2011
Cyber security threat analysis and modeling of an unmanned aerial vehicle system
AY Javaid, W Sun, VK Devabhaktuni, M Alam
2012 IEEE Conference on Technologies for Homeland Security (HST), 585-590, 2012
A deep learning based DDoS detection system in software-defined networking (SDN)
Q Niyaz, W Sun, AY Javaid
arXiv preprint arXiv:1611.07400, 2016
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
W Sun, Z Liang, VN Venkatakrishnan, R Sekar
NDSS, 2005
Collabra: a xen hypervisor based collaborative intrusion detection system
S Bharadwaja, W Sun, M Niamat, F Shen
2011 Eighth International Conference on Information Technology: New …, 2011
Trust system design optimization in smart grid network infrastructure
Y Zhang, L Wang, W Sun
IEEE Transactions on Smart Grid 4 (1), 184-195, 2013
Trust system design optimization in smart grid network infrastructure
Y Zhang, L Wang, W Sun
IEEE Transactions on Smart Grid 4 (1), 184-195, 2013
A neural network based distributed intrusion detection system on cloud platform
Z Li, W Sun, L Wang
2012 IEEE 2nd international conference on Cloud Computing and Intelligence …, 2012
A multi-level communication architecture of smart grid based on congestion aware wireless mesh network
Y Zhang, W Sun, L Wang, H Wang, RC Green, M Alam
2011 North American Power Symposium, 1-6, 2011
UAVSim: A simulation testbed for unmanned aerial vehicle network cyber security analysis
AY Javaid, W Sun, M Alam
2013 IEEE Globecom Workshops (GC Wkshps), 1432-1436, 2013
Practical proactive integrity preservation: A basis for malware defense
W Sun, R Sekar, G Poothia, T Karandikar
2008 IEEE Symposium on Security and Privacy (sp 2008), 248-262, 2008
Efficient spam detection across online social networks
H Xu, W Sun, A Javaid
2016 IEEE International Conference on Big Data Analysis (ICBDA), 1-6, 2016
V-NetLab: a cost-effective platform to support course projects in computer security
K Krishna, W Sun, P Rana, T Li, R Sekar
Proceedings of 9th Colloquium for Information Systems Security Education, 4, 2005
Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid
Y Zhang, L Wang, W Sun, RC Green, M Alam
2011 IEEE Power and Energy Society General Meeting, 1-8, 2011
Alcatraz: An isolated environment for experimenting with untrusted software
Z Liang, W Sun, VN Venkatakrishnan, R Sekar
ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-37, 2009
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments.
W Sun, V Katta, K Krishna, R Sekar
CSET 8, 1-6, 2008
Security modeling of autonomous systems: a survey
F Jahan, W Sun, Q Niyaz, M Alam
ACM Computing Surveys (CSUR) 52 (5), 1-34, 2019
Distributed network traffic feature extraction for a real-time IDS
AM Karimi, Q Niyaz, W Sun, AY Javaid, VK Devabhaktuni
2016 IEEE International Conference on Electro Information Technology (EIT …, 2016
Analysis of global positioning system-based attacks and a novel global positioning system spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation
AY Javaid, F Jahan, W Sun
Simulation 93 (5), 427-441, 2017
The system can't perform the operation now. Try again later.
Articles 1–20