2020 - IEEE Fellow For contributions to network and cloud security
His main research concerns Computer network, World Wide Web, Computer security, The Internet and Flooding. The concepts of his Computer network study are interwoven with issues in Internet Protocol and Denial-of-service attack. His Web page, Internet users and Internet chat study, which is part of a larger body of work in World Wide Web, is frequently linked to Popularity and Measurement study, bridging the gap between disciplines.
His Computer security research is multidisciplinary, relying on both Context and Hop. His work on Voice over IP and Internet traffic as part of his general The Internet study is frequently connected to Entropy, thereby bridging the divide between different branches of science. His research in Flooding intersects with topics in SYN flood and Internet protocol suite.
His primary areas of investigation include Computer security, Computer network, The Internet, World Wide Web and Internet privacy. In his research on the topic of Computer security, Host is strongly related with Cloud computing. Haining Wang interconnects Denial-of-service attack and Distributed computing in the investigation of issues within Computer network.
Haining Wang has researched Distributed computing in several fields, including Scalability and Tracing. His study in The Internet is interdisciplinary in nature, drawing from both Multimedia and Server. His work on Web page, Web application and Session as part of general World Wide Web study is frequently linked to Popularity, bridging the gap between disciplines.
His scientific interests lie mostly in Computer security, World Wide Web, Internet privacy, The Internet and Information leakage. The various areas that Haining Wang examines in his Computer security study include Android, Data center and Server. World Wide Web is closely attributed to Rule-based system in his study.
His research in the fields of Denial-of-service attack and Internet users overlaps with other disciplines such as IPv4. Haining Wang combines subjects such as Fault tolerance, Computer network, Load balancing and Downtime with his study of Cloud computing. His studies deal with areas such as DNS spoofing, Live migration and Internet protocol suite as well as Computer network.
The scientist’s investigation covers issues in Computer security, Internet privacy, The Internet, Information leakage and Server. Particularly relevant to Authentication is his body of work in Computer security. His work on Cyberspace as part of general The Internet research is frequently linked to IPv4, Measurement study and Residual, thereby connecting diverse disciplines of science.
His Cyberspace research is multidisciplinary, incorporating perspectives in High availability, Real-time computing and Embedded system. His Information leakage research is multidisciplinary, incorporating elements of Traffic analysis, Crowdsourcing, Confidentiality, Encryption and False positive rate. His biological study spans a wide range of topics, including Online advertising, Metadata, Resolution and Vulnerability.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Detecting SYN flooding attacks
Haining Wang;Danlu Zhang;Kang G. Shin.
international conference on computer communications (2002)
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
Zi Chu;S. Gianvecchio;Haining Wang;S. Jajodia.
IEEE Transactions on Dependable and Secure Computing (2012)
Hop-count filtering: an effective defense against spoofed DDoS traffic
Cheng Jin;Haining Wang;Kang G. Shin.
computer and communications security (2003)
Who is tweeting on Twitter: human, bot, or cyborg?
Zi Chu;Steven Gianvecchio;Haining Wang;Sushil Jajodia.
annual computer security applications conference (2010)
Defense against spoofed IP traffic using hop-count filtering
Haining Wang;Cheng Jin;Kang G. Shin.
IEEE ACM Transactions on Networking (2007)
Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud
Zhenyu Wu;Zhang Xu;Haining Wang.
IEEE ACM Transactions on Networking (2015)
Change-point monitoring for the detection of DoS attacks
Haining Wang;Danlu Zhang;K.G. Shin.
IEEE Transactions on Dependable and Secure Computing (2004)
You Are How You Touch: User Verification on Smartphones via Tapping Behaviors
Nan Zheng;Kun Bai;Hai Huang;Haining Wang.
international conference on network protocols (2014)
An efficient user verification system via mouse movements
Nan Zheng;Aaron Paloski;Haining Wang.
computer and communications security (2011)
Detecting covert timing channels: an entropy-based approach
Steven Gianvecchio;Haining Wang.
computer and communications security (2007)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: