The following publications are possibly variants of this publication:
- Modeling Network Traffic via Identifying Encrypted Packets to Detect Stepping-Stone Intrusion Under the Framework of Heterogonous Packet EncryptionNoah Neundorfer, Jianhua Yang, Lixin Wang. aina 2022: 516-527 [doi]
- Modelling Network Traffic and Exploiting Encrypted Packets to Detect Stepping-stone IntrusionsJianhua Yang, Lixin Wang, Suhev Shakya. jisis, 12(1):2-25, 2022. [doi]
- Correlating TCP/IP Packet contexts to detect stepping-stone intrusionJianhua Yang, David Woolbright. compsec, 30(6-7):538-546, 2011. [doi]
- Mining TCP/IP packets to detect stepping-stone intrusionJianhua Yang, Shou-Hsuan Stephen Huang. compsec, 26(7-8):479-484, 2007. [doi]
- Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-MatchingJianhua Yang, Byong Lee. ATC 2008: 2-12 [doi]
- Monitoring Network Traffic to Detect Stepping-Stone IntrusionJianhua Yang, Byong Lee, Stephen S. H. Huang. aina 2008: 56-61 [doi]
- An Effective Approach for Stepping-Stone Intrusion Detection Using Packet CrossoverLixin Wang, Jianhua Yang, Austin Lee. wisa 2023: 77-88 [doi]
- Mining Network Traffic Efficiently to Detect Stepping-Stone IntrusionYingjie Sheng, Yongzhong Zhang, Jianhua Yang. aina 2012: 862-867 [doi]