Folgen
ERIC CHEN
ERIC CHEN
Cisco
Bestätigte E-Mail-Adresse bei mail.mcgill.ca
Titel
Zitiert von
Zitiert von
Jahr
Detecting DoS attacks on SIP systems
EY Chen
1st IEEE Workshop on VoIP Management and Security, 2006., 53-58, 2006
1512006
Virtual smartphone over IP
EY Chen, M Itoh
2010 IEEE International Symposium on" A World of Wireless, Mobile and …, 2010
1122010
Offloading android applications to the cloud without customizing android
E Chen, S Ogata, K Horikawa
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
662012
Distributed denial of service attack defense method and device
EY Chen, H Fuji
US Patent 7,188,366, 2007
502007
A whitelist approach to protect SIP servers from flooding attacks
EY Chen, M Itoh
2010 IEEE International Workshop Technical Committee on Communications …, 2010
472010
Using call patterns to detect unwanted communication callers
T Kusumoto, EY Chen, M Itoh
2009 Ninth Annual International Symposium on Applications and the Internet …, 2009
282009
Aegis: An active-network-powered defense mechanism against ddos attacks
EY Chen
IFIP International Working Conference on Active Networks, 1-15, 2001
262001
Android as a server platform
M Toyama, S Kurumatani, J Heo, K Terada, EY Chen
2011 IEEE Consumer Communications and Networking Conference (CCNC), 1181-1185, 2011
252011
Active shaping: a countermeasure against DDoS attacks
D Kashiwa, EY Chen, H Fuji
2nd European Conference on Universal Multiservice Networks. ECUMN'2001 (Cat …, 2002
242002
System and method for assessing android applications malware risk
E Chen
US Patent 10,681,080, 2020
192020
Scalable detection of SIP fuzzing attacks
EY Chen, M Itoh
2008 Second International Conference on Emerging Security Information …, 2008
122008
User demand prediction from application usage pattern in virtual smartphone
J Heo, K Terada, M Toyama, S Kurumatani, EY Chen
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
112010
Virtual smartphone over IP
M Itoh, EY Chen, T Kusumoto
NTT Technical Review 8 (7), 2010
112010
Practical techniques for defending against DDoS attacks
EY Chen, A Yonezawa
The 3rd ACS/IEEE International Conference onComputer Systems and …, 2005
112005
Repeater, repeating method, repeating program, and network attack defending system
K Sebayashi, H Kurakami, Y Soejima, E Chen, H Fuji
US Patent App. 10/587,041, 2007
102007
Detecting DDoS attacks by analyzing client response patterns
Y Soejima, EY Chen, H Fuji
2005 Symposium on Applications and the Internet Workshops (SAINT 2005 …, 2005
102005
Using end-to-middle security to protect against evil twin access points
EY Chen, M Ito
2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009
92009
SPEERMINT security threats and suggested countermeasures
S Niccolini, E Chen, J Seedorf, H Scholz
Draft IETF draft-ietf-speermint-voipthreats-01 (July 2009), 2009
82009
Executing client-side web workers in the cloud
S Kurumatani, M Toyama, EY Chen
2012 9th Asia-Pacific Symposium on Information and Telecommunication …, 2012
62012
Thin client technology for mobile service platform
Y Honda, T Okagawa, K Uchiyama, S Kurumatnai, M Toyama, EY Chen, ...
2012 World Telecommunications Congress, 1-6, 2012
62012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20