Authentication for resilience: the case of SDN (transcript of discussion) D Yu Cambridge international workshop on security protocols, 45-53, 2013 | 35 | 2013 |
Humboldt: A distributed phishing disruption system P Knickerbocker, D Yu, J Li 2009 eCrime Researchers Summit, 1-12, 2009 | 19 | 2009 |
Collaborating with the enemy on network management C Hall, D Yu, Z Zhang, J Stout, A Odlyzko, AW Moore, J Camp, K Benton, ... Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014 | 12 | 2014 |
Security: a Killer App for SDN D Yu, AW Moore, C Hall, R Anderson, INDIANA UNIV AT BLOOMINGTON Tech. rep. Indiana Uni. at Bloomington, 2014 | 5 | 2014 |
A resource management approach to web browser security J Li, D Yu, L Maurer 2012 International Conference on Computing, Networking and Communications …, 2012 | 3 | 2012 |
Access control for network management D Yu University of Cambridge, Computer Laboratory, 2017 | 2 | 2017 |
Towards a Stronger Location Integrity R Xu, D Yu Cambridge International Workshop on Security Protocols, 176-179, 2013 | 1 | 2013 |
SECURITY: A KILLER APP FOR SDN?(POST PRINT) D Yu, A Moore, C Hall, R Anderson | | 2014 |
Authentication for resilience: the case of SDN D Yu, AW Moore, C Hall, R Anderson Cambridge International Workshop on Security Protocols, 39-44, 2013 | | 2013 |
2009 eCrime Researchers Summit P Knickerbocker, D Yu, J Li, F Toolan, J Carthy, M Guirguis, J Valdez, ... | | |