D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 50 Citations 10,441 161 World Ranking 2946 National Ranking 1555

Research.com Recognitions

Awards & Achievements

2020 - IEEE Fellow For contributions to network and cloud security

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Operating system
  • Computer network

His main research concerns Computer network, World Wide Web, Computer security, The Internet and Flooding. The concepts of his Computer network study are interwoven with issues in Internet Protocol and Denial-of-service attack. His Web page, Internet users and Internet chat study, which is part of a larger body of work in World Wide Web, is frequently linked to Popularity and Measurement study, bridging the gap between disciplines.

His Computer security research is multidisciplinary, relying on both Context and Hop. His work on Voice over IP and Internet traffic as part of his general The Internet study is frequently connected to Entropy, thereby bridging the divide between different branches of science. His research in Flooding intersects with topics in SYN flood and Internet protocol suite.

His most cited work include:

  • Detecting SYN flooding attacks (525 citations)
  • Hop-count filtering: an effective defense against spoofed DDoS traffic (448 citations)
  • Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? (377 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Computer network, The Internet, World Wide Web and Internet privacy. In his research on the topic of Computer security, Host is strongly related with Cloud computing. Haining Wang interconnects Denial-of-service attack and Distributed computing in the investigation of issues within Computer network.

Haining Wang has researched Distributed computing in several fields, including Scalability and Tracing. His study in The Internet is interdisciplinary in nature, drawing from both Multimedia and Server. His work on Web page, Web application and Session as part of general World Wide Web study is frequently linked to Popularity, bridging the gap between disciplines.

He most often published in these fields:

  • Computer security (34.72%)
  • Computer network (23.83%)
  • The Internet (21.24%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (34.72%)
  • World Wide Web (17.62%)
  • Internet privacy (11.92%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Computer security, World Wide Web, Internet privacy, The Internet and Information leakage. The various areas that Haining Wang examines in his Computer security study include Android, Data center and Server. World Wide Web is closely attributed to Rule-based system in his study.

His research in the fields of Denial-of-service attack and Internet users overlaps with other disciplines such as IPv4. Haining Wang combines subjects such as Fault tolerance, Computer network, Load balancing and Downtime with his study of Cloud computing. His studies deal with areas such as DNS spoofing, Live migration and Internet protocol suite as well as Computer network.

Between 2016 and 2021, his most popular works were:

  • Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices (45 citations)
  • ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds (45 citations)
  • Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains (29 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

The scientist’s investigation covers issues in Computer security, Internet privacy, The Internet, Information leakage and Server. Particularly relevant to Authentication is his body of work in Computer security. His work on Cyberspace as part of general The Internet research is frequently linked to IPv4, Measurement study and Residual, thereby connecting diverse disciplines of science.

His Cyberspace research is multidisciplinary, incorporating perspectives in High availability, Real-time computing and Embedded system. His Information leakage research is multidisciplinary, incorporating elements of Traffic analysis, Crowdsourcing, Confidentiality, Encryption and False positive rate. His biological study spans a wide range of topics, including Online advertising, Metadata, Resolution and Vulnerability.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Detecting SYN flooding attacks

Haining Wang;Danlu Zhang;Kang G. Shin.
international conference on computer communications (2002)

934 Citations

Hop-count filtering: an effective defense against spoofed DDoS traffic

Cheng Jin;Haining Wang;Kang G. Shin.
computer and communications security (2003)

688 Citations

Who is tweeting on Twitter: human, bot, or cyborg?

Zi Chu;Steven Gianvecchio;Haining Wang;Sushil Jajodia.
annual computer security applications conference (2010)

577 Citations

Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?

Zi Chu;S. Gianvecchio;Haining Wang;S. Jajodia.
IEEE Transactions on Dependable and Secure Computing (2012)

544 Citations

Defense against spoofed IP traffic using hop-count filtering

Haining Wang;Cheng Jin;Kang G. Shin.
IEEE ACM Transactions on Networking (2007)

407 Citations

Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud

Zhenyu Wu;Zhang Xu;Haining Wang.
IEEE ACM Transactions on Networking (2015)

357 Citations

Change-point monitoring for the detection of DoS attacks

Haining Wang;Danlu Zhang;K.G. Shin.
IEEE Transactions on Dependable and Secure Computing (2004)

327 Citations

You Are How You Touch: User Verification on Smartphones via Tapping Behaviors

Nan Zheng;Kun Bai;Hai Huang;Haining Wang.
international conference on network protocols (2014)

306 Citations

An efficient user verification system via mouse movements

Nan Zheng;Aaron Paloski;Haining Wang.
computer and communications security (2011)

268 Citations

Detecting covert timing channels: an entropy-based approach

Steven Gianvecchio;Haining Wang.
computer and communications security (2007)

249 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.