1. Cai, M., Hwang, K., Kwok, Y.-K., Chen, Y., Song, S.: Fast Conatinment of Internet Worms for Epidemic Defense using Distributed-Hashing Overlays. In: IEEE Security and Privacy. Submitted July 2004 and revised March 6, November/December (2005) (to appear)
2. Cai, M., Kwok, Y.-K., Hwang, K.: Inferring Network Anomalies from Mices: A Low-Complexity Traffic Monitoring Approach. Preparation for submission to ACM SIGCOMM Workshop on Mining Network Data (2005)
3. Chen, Y., Kwok, Y.-K., Hwang, K.: MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Pushback DDoS Attacks. In: Proc. Int’l Workshop on Security in Distributed Systems (SDCS-2005), in conjunction with ICDCS 2005, Columbus, Ohio, USA (June 2005)
4. Cuppens, F., Miege, A.: Alert Correlation in a Cooperative Intrusion Detection Framework. In: IEEE Symposium on Security and Privacy, pp. 187–200 (2002)
5. Durand, M., Flajolet, P.: LogLog Counting of Large Cardinalities. In: Proc. European Symp. on Algorithms (2003)