Name
Papers
Collaborators
KUN SUN
25
42
Citations 
PageRank 
Referers 
142
12.80
371
Referees 
References 
492
251
Search Limit
100492
Title
Citations
PageRank
Year
Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks00.342022
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots00.342022
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I.00.342020
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II.00.342020
Memory Forensic Challenges Under Misused Architectural Features.10.352018
Your Neighbors are Listening: Evaluating PostMessage Use in OAuth00.342017
FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes.00.342017
Now You See Me: Hide and Seek in Physical Address Space30.392015
HyperCheck: A Hardware-AssistedIntegrity Monitor160.752014
Protecting Enterprise Networks through Attack Surface Expansion70.582014
Remotely wiping sensitive data on stolen smartphones40.552014
MOTAG: Moving Target Defense against Internet Denial of Service Attacks241.232013
Verification of data redundancy in cloud storage10.412013
SPECTRE: A dependable introspection framework via System Management Mode240.772013
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications10.342013
TerraCheck: verification of dedicated cloud storage00.342013
A moving target defense mechanism for MANETs based on identity virtualization110.812013
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.130.702012
A dependability analysis of hardware-assisted polling integrity checking systems30.392012
Hardware-Assisted Application Integrity Monitor10.482012
NetGator: malware detection using program interactive challenges20.402012
Disk storage isolation and verification in cloud40.442012
Automatic Security Analysis Using Security Metrics60.472011
Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics180.952011
CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET30.412011