Monitoring operational activities in networks and detecting potential network intrusions and misuses Z Ge, J Chu, R Huber, P Ji, J Yates, YC Yu US Patent 9,401,924, 2016 | 81 | 2016 |
Monitoring operational activities in networks and detecting potential network intrusions and misuses Z Ge, J Chu, R Huber, P Ji, J Yates, YC Yu US Patent 9,401,924, 2016 | 81 | 2016 |
A Survey of Research in Stepping-Stone Detection R Shullich, J Chu, P Ji, W Chen International Journal of Electronic Commerce Studies 2 (2), 103-126, 2011 | 20 | 2011 |
ALERT-ID: Analyze Logs of the network Element in Real Time for Intrusion Detection J Chu, Z Ge, R Huber, P Ji, J Yates, YC Yu | 19 | 2011 |
A Distributed Approach to the Evasion Problem D Khryashchev, J Chu, M Vejdemo-Johansson, P Ji Algorithms 13 (6), 149, 2020 | 5 | 2020 |
An improved algorithm for Generalized\v {C} ech complex construction J Chu, M Vejdemo-Johansson, P Ji arXiv preprint arXiv:2209.15574, 2022 | 1 | 2022 |
Performance Modeling for Network Anomaly Detection and Sensor Networks J Chu City University of New York, 2023 | | 2023 |
The privacy leaky bucket: your mobile devices: poster J Chu, P Ji Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc …, 2016 | | 2016 |
Homotopy path enumeration for the evasion problem MV Johansson, J Chu, D Khryashchev, P Ji 2021 Joint Mathematics Meetings (JMM), 0 | | |