Detecting DoS attacks on SIP systems EY Chen 1st IEEE Workshop on VoIP Management and Security, 2006., 53-58, 2006 | 151 | 2006 |
Virtual smartphone over IP EY Chen, M Itoh 2010 IEEE International Symposium on" A World of Wireless, Mobile and …, 2010 | 112 | 2010 |
Offloading android applications to the cloud without customizing android E Chen, S Ogata, K Horikawa 2012 IEEE International Conference on Pervasive Computing and Communications …, 2012 | 66 | 2012 |
Distributed denial of service attack defense method and device EY Chen, H Fuji US Patent 7,188,366, 2007 | 50 | 2007 |
A whitelist approach to protect SIP servers from flooding attacks EY Chen, M Itoh 2010 IEEE International Workshop Technical Committee on Communications …, 2010 | 47 | 2010 |
Using call patterns to detect unwanted communication callers T Kusumoto, EY Chen, M Itoh 2009 Ninth Annual International Symposium on Applications and the Internet …, 2009 | 28 | 2009 |
Aegis: An active-network-powered defense mechanism against ddos attacks EY Chen IFIP International Working Conference on Active Networks, 1-15, 2001 | 26 | 2001 |
Android as a server platform M Toyama, S Kurumatani, J Heo, K Terada, EY Chen 2011 IEEE Consumer Communications and Networking Conference (CCNC), 1181-1185, 2011 | 25 | 2011 |
Active shaping: a countermeasure against DDoS attacks D Kashiwa, EY Chen, H Fuji 2nd European Conference on Universal Multiservice Networks. ECUMN'2001 (Cat …, 2002 | 24 | 2002 |
System and method for assessing android applications malware risk E Chen US Patent 10,681,080, 2020 | 19 | 2020 |
Scalable detection of SIP fuzzing attacks EY Chen, M Itoh 2008 Second International Conference on Emerging Security Information …, 2008 | 12 | 2008 |
User demand prediction from application usage pattern in virtual smartphone J Heo, K Terada, M Toyama, S Kurumatani, EY Chen 2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010 | 11 | 2010 |
Virtual smartphone over IP M Itoh, EY Chen, T Kusumoto NTT Technical Review 8 (7), 2010 | 11 | 2010 |
Practical techniques for defending against DDoS attacks EY Chen, A Yonezawa The 3rd ACS/IEEE International Conference onComputer Systems and …, 2005 | 11 | 2005 |
Repeater, repeating method, repeating program, and network attack defending system K Sebayashi, H Kurakami, Y Soejima, E Chen, H Fuji US Patent App. 10/587,041, 2007 | 10 | 2007 |
Detecting DDoS attacks by analyzing client response patterns Y Soejima, EY Chen, H Fuji 2005 Symposium on Applications and the Internet Workshops (SAINT 2005 …, 2005 | 10 | 2005 |
Using end-to-middle security to protect against evil twin access points EY Chen, M Ito 2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009 | 9 | 2009 |
SPEERMINT security threats and suggested countermeasures S Niccolini, E Chen, J Seedorf, H Scholz Draft IETF draft-ietf-speermint-voipthreats-01 (July 2009), 2009 | 8 | 2009 |
Executing client-side web workers in the cloud S Kurumatani, M Toyama, EY Chen 2012 9th Asia-Pacific Symposium on Information and Telecommunication …, 2012 | 6 | 2012 |
Thin client technology for mobile service platform Y Honda, T Okagawa, K Uchiyama, S Kurumatnai, M Toyama, EY Chen, ... 2012 World Telecommunications Congress, 1-6, 2012 | 6 | 2012 |