Follow
ERIC CHEN
ERIC CHEN
Cisco
Verified email at mail.mcgill.ca
Title
Cited by
Cited by
Year
Detecting DoS attacks on SIP systems
EY Chen
1st IEEE Workshop on VoIP Management and Security, 2006., 53-58, 2006
1512006
Virtual smartphone over IP
EY Chen, M Itoh
2010 IEEE International Symposium on" A World of Wireless, Mobile and …, 2010
1122010
Offloading android applications to the cloud without customizing android
E Chen, S Ogata, K Horikawa
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
662012
Distributed denial of service attack defense method and device
EY Chen, H Fuji
US Patent 7,188,366, 2007
502007
A whitelist approach to protect SIP servers from flooding attacks
EY Chen, M Itoh
2010 IEEE International Workshop Technical Committee on Communications …, 2010
472010
Using call patterns to detect unwanted communication callers
T Kusumoto, EY Chen, M Itoh
2009 Ninth Annual International Symposium on Applications and the Internet …, 2009
282009
Aegis: An active-network-powered defense mechanism against ddos attacks
EY Chen
IFIP International Working Conference on Active Networks, 1-15, 2001
262001
Android as a server platform
M Toyama, S Kurumatani, J Heo, K Terada, EY Chen
2011 IEEE Consumer Communications and Networking Conference (CCNC), 1181-1185, 2011
252011
Active shaping: a countermeasure against DDoS attacks
D Kashiwa, EY Chen, H Fuji
2nd European Conference on Universal Multiservice Networks. ECUMN'2001 (Cat …, 2002
242002
System and method for assessing android applications malware risk
E Chen
US Patent 10,681,080, 2020
192020
Scalable detection of SIP fuzzing attacks
EY Chen, M Itoh
2008 Second International Conference on Emerging Security Information …, 2008
122008
User demand prediction from application usage pattern in virtual smartphone
J Heo, K Terada, M Toyama, S Kurumatani, EY Chen
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
112010
Virtual smartphone over IP
M Itoh, EY Chen, T Kusumoto
NTT Technical Review 8 (7), 2010
112010
Practical techniques for defending against DDoS attacks
EY Chen, A Yonezawa
The 3rd ACS/IEEE International Conference onComputer Systems and …, 2005
112005
Repeater, repeating method, repeating program, and network attack defending system
K Sebayashi, H Kurakami, Y Soejima, E Chen, H Fuji
US Patent App. 10/587,041, 2007
102007
Detecting DDoS attacks by analyzing client response patterns
Y Soejima, EY Chen, H Fuji
2005 Symposium on Applications and the Internet Workshops (SAINT 2005 …, 2005
102005
Using end-to-middle security to protect against evil twin access points
EY Chen, M Ito
2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009
92009
SPEERMINT security threats and suggested countermeasures
S Niccolini, E Chen, J Seedorf, H Scholz
Draft IETF draft-ietf-speermint-voipthreats-01 (July 2009), 2009
82009
Executing client-side web workers in the cloud
S Kurumatani, M Toyama, EY Chen
2012 9th Asia-Pacific Symposium on Information and Telecommunication …, 2012
62012
Thin client technology for mobile service platform
Y Honda, T Okagawa, K Uchiyama, S Kurumatnai, M Toyama, EY Chen, ...
2012 World Telecommunications Congress, 1-6, 2012
62012
The system can't perform the operation now. Try again later.
Articles 1–20