Carol Fung and Raouf Boutaba. "Intrusion Detection Networks: A Key to Distributed Security", CRC Press. 259 pages. November 2013. ISBN: 978-1-4665-6412-1. LinkBibTeX
Book chapters:
Carol Fung and Raouf Boutaba. "Cooperation in Intrusion Detection Networks", chapter 9 in Cooperative Networks, M. S. Obaidat and S. Misra (editors), Jon Wiley & Sons publishing, 2010
V. B. Misic, J. Fung, and J. Misic. "MAC Layer Attacks in 802.15.4 Sensor Networks", chapter 12 in Security in Sensor Networks, Yang Xiao (editor), CRC Press, 2006
Journal papers:
Bahman Rashidi, Carol Fung, Anh Nguyen, Tam Vu, and Elisa Bertino. "Android User Privacy Preserving through Crowdsourcing". IEEE Transaction on Information Forensics & Security (TIFS). 2018. Impact factor: 4.33 PDFBibTeX
Bahman Rashidi, Carol Fung and Elisa Bertino. "A Collaborative DDoS Defence Framework using Network Function Virtualization". IEEE Transaction on Information Forensics & Security (TIFS). 2017. Impact factor: 4.33 PDFBibTeX
Bahman Rashidi, Carol Fung and Elisa Bertino. "Android Resource Usage Risk Assessment using Hidden Markov Model and Online Learning". Elsevier Computers & Security (COSE). 2017. Impact factor: 2.94 PDFBibTeX
Carol Fung and Quanyan zhu. "FACID: A Trust-based Collaborative Decision Framework for Intrusion Detection Networks". Elsevier Ad Hoc Networks Journal (ADHOC). 2016. Impact factor: 3.17 PDFBibTeX
Molka Gharbaouia, Barbara Martini, Carol Fung, Francesco Paolucci, Alessio Giorgetti, and Piero Castoldi. "An Incentive-compatible and Trust-aware Multi-Provider Path Computation Element (PCE)". Elsevier Computer Networks (COMNET). 2016. Impact factor: 2.59 PDFBibTeX
Bahman Rashidi, Carol Fung, and Tam Vu. "Android Fine-grained Permission Control System with Real-Time Expert Recommendations". Elsevier Pervasive and Mobile Computing. 2016. Impact factor: 2.87 PDFBibTeX
Bahman Rashidi, and Carol Fung, "A Survey of Android Security Threats and Defenses". In Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 6, No. 3, September 2015. PDFBibTeX
Bahman Rashidi, and Carol Fung, "Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model". In Journal of Internet Services and Information Security (JISIS), Vol. 5, No. 2, May 2015. PDFBibTeX
Quanyan Zhu, Carol J. Fung, Raouf Boutaba, and Tamer Barsar. GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks. In IEEE Journal on Selected Areas in Communications, special issue on Economics of Communication Networks & Systems. 2012. PDFBibTeX
C. Fung, J. Zhang and R. Boutaba. Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks. In IEEE Transactions on Network and Service Management. March 2012. PDFBibTeX
C. Fung. "Collaborative Intrusion Detection Networks and Insider Attacks", Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol 2(1), pp. 63-74, 2011. PDFBibTeX
Carol J. Fung, Jie Zhang, and Raouf Boutaba. "Dirichlet-based Trust Management for Effective Collaborative Intrusion Detection Networks". IEEE Transaction on Network Service and Management (TNSM), Vol. 8(2), pp. 79-91, 2011. PDFBibTeX
Carol J. Fung, Jie Zhang, Issam Aib, and Raouf Boutaba. "Trust Management and Admission Control for Host-based Collaborative Intrusion Detection". Journal of Network and Systems Management (JNSM), Vol. 19(2), pp. 257-277, 2010. PDFBibTeX
J. Misic , C.J. Fung, "The impact of master-slave bridge access mode on the performance of multi-cluster 802.15.4 network", Elsevier's Computer Networks, 2007
J. Misic, V. B. Misic, C. J. Fung, and S. Shafi. "Faster lanes, longer lifetimes: activity management in interconnected 802.15.4 sensor clusters", Mobile Networks and Applications Journal (MONET), 2006
J. Misic, C. J. Fung, and V. B. Misic. "Interconnecting 802.15.4 clusters in master-slave mode using guaranteed time slots and acknowledged transfers: queueing theoretic analysis", Journal of Interconnection Networks, 2006
Conference and Workshop papers:
Bahman Rashidi, Carol Fung, Kevin W. Hamlen and Andrzej Kamisinski. "HoneyV: A Virtualized Honeynet System Based on Network Softwarization". In IEEE/IFIP Network Operations and Management Symposium (NOMS 2018). Short paper.
Bahman Rashidi and Carol Fung. "A Scalable and Flexible DDoS Mitigation System Using Network Function Virtualization". In 4TH IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT'18)
Bahman Rashidi, Carol Fung and Elisa Bertino. "Android Malicious Application Detection Using Support Vector Machine and Active Learning". 2017 IEEE/IFIP International Conference on Network and Service Management(CNSM'17).(17% acceptance rate)
Shaohan Huang, Carol Fung, Shupeng Zhang, Guang Wei, Zhongzhi Luan and Depei Qian. "Arena: adaptive real-time update anomaly prediction in cloud systems". 2017 IEEE/IFIP International Conference on Network and Service Management(CNSM'17).(17% acceptance rate)
A h m Jakaria, Mohammad Ashiqur Rahman and Carol Fung. "Automated Synthesis of NFV Topology: A Security Requirement-Oriented Design". 2017 IEEE/IFIP International Conference on Network and Service Management(CNSM'17). Short paper.
Shupeng Zhang, Carol Fung, Shaohan Huang, Zhongzhi Luan and Depei Qian. "PSOM: Periodic Self-Organizing Maps for Unsupervised Anomaly Detection in Periodic Time Series". 2017 IEEE/ACM International Symposium on Quality of Service (IWQoS'17).
Seyyit Alper Sert, Adnan Yazici, Carol Fung and George Roy. "An Efficient Fuzzy Path Selection Approach to Mitigate Selective Forwarding Attacks in Wireless Sensor Networks". IEEE International Conference on Fuzzy Systems 2017 (FUZZ-IEEE'17).PDFBibTeX
Pulkit Rustgi, Carol Fung, Bahman Rashidi, and Bridget McInnes. "DroidVisor: An Android Secure Application Recommendation System". In 3RD IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT'17).
A H M Jakaria, Bahman Rashidi, Mohammad A. Rahman, Carol Fung, and Wei Yang. "Dynamic DDoS defense resource allocation using Network Function Virtualization". In ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFV Security'17).
Hui Yu, Jiahai Yang, and Carol Fung. "SpongeNet+: A Two-layer Bandwidth Allocation Framework for Cloud Datacenter". In 18th International Conferences on High Performance Computing and Communications. 2016. (HPCC'16)
Bahman Rashidi and Carol Fung. "CoFence: A Collaborative DDoS Defence Using Network Function Virtualization". In 12th International Conference on Network and Service Management. 2016. mini conf. (CNSM'16) (25% acceptance rate) PDFBibTeX
Bahman Rashidi and Carol Fung. "XDroid: An Android Permission Control Using Hidden Markov Chain and Online Learning". In IEEE Conference on Communications and Network Security 2016 (CNS'16) (29% acceptance rate) PDFBibTeX
Bahman Rashidi, Carol Fung, Ann Nguyen, and Tam Vu. "Android Permission Recommendation using Transitive Bayesian Inference Model". In the 21st European Symposium on research in computer security 2016 (ESORICS'16) (21% acceptance rate) PDFBibTeX
Shaohan Huang, Carol Fung, Kui Wang, Polo Pei, Zhongzhi Luan, and Depei Qian. "Using Recurrent Neural Networks Toward Black-Box System Anomaly Prediction" In IEEE/ACM International Symposium on Quality of Service 2016 (IWQoS'16) (20% acceptance rate) PDFBibTeX
A H M Jakaria, Wei Yang, Bahman Rashidi, Carol Fung, and M. Ashiqur Rahman. "VFence: A Defense against Distributed Denial of Service Attacks using Network Function Virtualization" In the 11th IEEE International Workshop on Security, Trust, and Privacy for Software Applications(STPSA 2016). (32.5% acceptance rate) PDFBibTeX
Wei Yang and Carol Fung. "A survey on security in network functions virtualization" In IEEE Conference on Network Softwarization(Netsoft'16). Seoul, Korea. Short paper. (37% acceptance rate) PDFBibTeX
Bahman Rashidi and Carol Fung. "BotTracer: Bot User Detection Using Clustering Method in RecDroid." In IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies 2016 (DISSECT'16). Istanbul, Turkey. (40% acceptance rate) PDFBibTeX
Huanhuan Zhang, Jie Zhang, Carol Fung and Chang Xu. "Improving Sybil Detection via Graph Pruning and Regularization Techniques". In 7th Asian Conference on Machine Learning (ACML). November, 2015, Hong Kong. PDFBibTeX
Carol Fung and Bill McCormick. "VGuard: A Distributed Denial of Service Attack Mitigation Method using Network Function Virtualization". In 11th International Conference on Networks and Sevice Management (CNSM'15). Mini Conference Track. Barcelona, Spain. PDFBibTeX
Shaohan Huang, Carol Fung, Kui Wang, Yaqi Yang, Zhongzhi Luan, and Depei Qian. "Revisit Network Anomaly Ranking in Datacenter Network Using Re-ranking". In 4th IEEE International Conference on Cloud Computing (CloudNet'15). Niagara Falls, Canada. PDFBibTeX
Andrzej Kamisiński, and Carol Fung. "FlowMon: Detecting Malicious Switches in Software-Defined Networks". In ACM CCS workshop on Automated Decision Making for Active Cyber Defense 2015 (Safeconfig 2015). Denver, Colorado. PDFBibTeX
Bahman Rashidi, Carol Fung, Gerrit Bond, Steven Jackson, Marcus Pare, and Tam Vu. "RecDroid: An Android Resource Access Permission Recommendation System." ACM MobiHoc 2015. Demo paper. Hangzhou, China. PDFBibTeX
Chao Ding, Carol Fung, Kui Wang, Polo Peiz, You Meng, Zhongzhi Luan, Depei Qian. "A Methodology for Root-cause Analysis in Component Based Systems." IEEE/ACM International Symposium on Quality of Service (IWQoS) 2015. Short paper. Portland, Oregon.
Bahman Rashidi and Carol Fung. "A Game-Theoretic Model for Defending Against Malicious Users in RecDroid." Proceedings of the IEEE/IFIP IM2015 Workshop on Security for Emerging Distributed Network Technologies (DISSECT'15).PDFBibTeX
Lei Wei and Carol Fung. FlowRanger: "A Request Prioritizing Algorithm for Controller DoS Attacks in Software Defined Networks." IEEE International Conference on Communications (ICC 2015). London, UK. PDFBibTeX
Ioana Bara, Carol Fung, and Thang Dihn. "Enhancing Twitter Spam Accounts Discovery Using Cross-Account Pattern Mining." IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Mini Conference. Ottawa, Canada. PDFBibTeX
Bahman Rashidi, Carol Fung, and Tam Vu. "Dude, Ask The Experts!: Resource Access Permission Recommendation with RecDroid." IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Main Track. Ottawa, Canada. PDFBibTeX
Bahman Rashidi, Carol Fung, and Tam Vu, “RecDroid: A Resource Access Permission Control Portal and Recommendation Service for Smartphone Users”. Workshop on Security and Privacy Aspects of Mobile Environment. 2014 (SPME14).PDFBibTeX
Carol Fung, M. Gharbaoui, F. Paolucci, A. Giorgetti, P. Castoldi, and B. Martini, “Quality of Interaction among Path Computation Elements for Trust-aware Inter-Provider Cooperation”. IEEE International Conference on Communications (ICC14), Sydney, Australia, 2014.PDFBibTeX
Carol Fung, Disney Lam, and Raouf Boutaba, “RevMatch: An Efficient and Robust Decision Model for Collaborative Malware Detection”. IEEE/IFIP Network Operation and Management Symposium (NOMS14). Krakow, Poland, 2014.PDFBibTeX
Carol Fung, Raouf Boutaba, "Design and Management of Collaborative Intrusion Detection Networks". The 15th IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). Diseration Papaer. Ghent, Belgium, 2013. Best Disertation AwardPDFBibTeX
Carol J Fung, Quanyan Zhu, Raouf Boutaba, and Tamer Basar, "SMURFEN: A Framework of Knowledge Sharing for Collaborative Intrusion Detection", in the 7th international Conference on Network and Service Management, mini conference. 2011 PDFBibTeX
Quanyan Zhu, Carol J Fung, Raouf Boutaba, and Tamer Basar, "A Game-Theoretic Approach to Knowledge Sharing in Distributed Collaborative Intrusion Detection Networks: Fairness, Incentives and Security", in the 50th IEEE Conference on Decision and Control and European Control Conference, 2011 PDFBibTeX
Carol J Fung, Jie Zhang, and Raouf Boutaba. "Effective Acquaintance Management for Collaborative Intrusion Detection Networks", 6th International Conference on Network and Service Management (CNSM 2010). Niagara Fall, Canada. Best Student Paper AwardPDFBibTeX
Quanyan Zhu, Carol J. Fung, Raouf Boutaba, and Tamer Basar. "A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks", IEEE International Conference on Communications(ICC 2010). Cape Town, South Africa. PDFBibTeX
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, and Tamer Basar. "Bayesian Decision Aggregation in Collaborative Intrusion Detection Networks", IEEE/IFIP Network Operations and Management Symposium (NOMS 2010). Osaka, Japan. PDFBibTeX
Carol J Fung, Jie Zhang, Issam Aib, Raouf Boutaba, Robin Cohen. "Design of a Simulation Framework to Evaluate Trust Models for Collaborative Intrusion Detection", IFIP Network and Service Security Conference (N2S 09). Paris, France. PDFBibTeX
Quanyan Zhu, Carol Fung, Raouf Boutaba, Tamer Basar. "A Game-Theoretical Approach to Incentive Design in Collaborative Intrusion Detection Networks", International Conference on Game Theory for Networks (GameNets 09). Istanbul, Turkey. PDFBibTeX
Carol J. Fung, Jie Zhang, Issam Aib, and Raouf Boutaba. "Robust and Scalable Trust Management for Collaborative Intrusion Detection". The 11th IFIP/IEEE International Symposium on Integrated Network Management (IM 2009). New York, US. Best Paper AwardPDFBibTeX
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, and Raouf Boutaba. "Trust Management for Host-based Collaborative Intrusion Detection". International Workshop on Distributed Systems: Operations and Management 2008 (DSOM'08). Samos, Greece. PDFBibTeX
Carol J. Fung, Yanni Ellen Liu. "Lifetime Estimation of Large LR-WPAN Sensor Networks", IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems 2008 (MASCOTS'08). Baltimore, US. PDF
Jelena Misic, Carol J. Fung, Vojislav B. Misic "On Node Population in a Multi-Level 802.15.4 Sensor Network",IEEE Global Communications Conference (GLOBECOM'06) 2006
Jelena Misic, Carol J. Fung, Vojislav B. Misic "On Bridge Residence Times in Master-Slave Connected 802.15.4 Clusters", 20th International Conference on Advanced Information Networking and Applications (AINA'06)
Jelena Misic, Carol J. Fung, Vojislav B. Misic "Network Lifetime Equalization in Interconnected 802.15.4 Clusters",The Third International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks(Qshine2006)
Jelena Misic, J. Fung, and Vojislav Misic "Interconnecting 802.15.4 Clusters in Slotted CSMA-CA Mode", IEEE International Conferernce on Communications 2006(ICC'06)
J. Misic, J. Fung, and V. B. Misic. "Interconnecting 802.15.4 clusters in master-slave mode: queueing theoretic analysis", The International Symposium on Parallel Architectures, Algorithms, and Networks, 2005 (I-SPAN 2005),
V. B. Misic, J. Fung, and J. Misic. "MAC Layer Security of 802.15.4-Compliant Networks", International Workshop on Wireless and Sensor Network Security 2005 (WSNS'05)
Posters:
Carol J Fung, Disney Lam, and Raouf Boutaba, "REM: A Robust and Efficient Decision Model for Collaborative Malware Detection", USENIX Security 2013, Washington DC, USA
Carol J Fung, Quanyan Zhu, Raouf Boutaba, and Tamer Basar, "Knowledge Sharing and Propagation in Collaborative Intrusion Detection Networks", GameSec 2012, Budapest, Hungary.
Carol J Fung, Quanyan Zhu, Raouf Boutaba, and Tamer Basar, "SMURFEN: A Rule Sharing Collaborative Intrusion Detection Network", 18th ACM Conference on Computer and Communications Security (CCS), 2011. Chicago, IL, USA
Carol Fung, PhD
Associate Professor
Computer Science Department
School of Engineering
Virginia Commonwealth University
401 West Main Street
Richmond, Virginia
office: E-4234
Phone: (804)828-9731
Fax:(804)828-2771
Email: cfung@vcu dot edu