Part of the Information Security Commons

Works by Shiuh-Jeng Wang in Information Security

2008

Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks, Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang, Sajal Bhatia, Saurabh Gupta
Sajal Bhatia