Kaleido: Network traffic attribution using multifaceted footprintingTing WangFei Wanget al.2014SDM 2014
Outsourcing multi-version key-value stores with verifiable data freshnessYuzhe TangLing Liuet al.2014ICDE 2014
Stream computing for large-scale, multi-channel cyber threat analyticsDouglas L. SchalesMihai Christodorescuet al.2014IRI 2014
Modeling data flow in socio-information networks: A risk estimation approachTing WangMudhakar Srivatsaet al.2011SACMAT 2011
A temporal data-mining approach for discovering end-to-end transaction flowsChang-Shing PerngTao Taoet al.2008ICWS 2008