Authentication for resilience: the case of SDN D Yu, AW Moore, C Hall, R Anderson Cambridge International Workshop on Security Protocols, 39-44, 2013 | 30 | 2013 |
Humboldt: A distributed phishing disruption system P Knickerbocker, D Yu, J Li eCrime Researchers Summit, 2009. eCRIME'09., 1-12, 2009 | 14 | 2009 |
Collaborating with the enemy on network management C Hall, D Yu, Z Zhang, J Stout, A Odlyzko, AW Moore, J Camp, K Benton, ... Cambridge International Workshop on Security Protocols, 154-162, 2014 | 11 | 2014 |
Security: a Killer App for SDN? D Yu, AW Moore, C Hall, R Anderson INDIANA UNIV AT BLOOMINGTON, 2014 | 6 | 2014 |
Access control for network management D Yu University of Cambridge, Computer Laboratory, 2017 | 3 | 2017 |
A resource management approach to web browser security J Li, D Yu, L Maurer Computing, Networking and Communications (ICNC), 2012 International …, 2012 | 3 | 2012 |
Authentication for Resilience: The Case of SDN (Transcript of Discussion) D Yu Cambridge International Workshop on Security Protocols, 45-53, 2013 | 1 | 2013 |
Towards a Stronger Location Integrity R Xu, D Yu Cambridge International Workshop on Security Protocols, 176-179, 2013 | | 2013 |
2009 eCrime Researchers Summit P Knickerbocker, D Yu, J Li, F Toolan, J Carthy, M Guirguis, J Valdez, ... | | |