Books:
  1. Carol Fung and Raouf Boutaba. "Intrusion Detection Networks: A Key to Distributed Security", CRC Press. 259 pages. November 2013. ISBN: 978-1-4665-6412-1. Link BibTeX

    Book chapters:

  2. Carol Fung and Raouf Boutaba. "Cooperation in Intrusion Detection Networks", chapter 9 in Cooperative Networks, M. S. Obaidat and S. Misra (editors), Jon Wiley & Sons publishing, 2010

  3. V. B. Misic, J. Fung, and J. Misic. "MAC Layer Attacks in 802.15.4 Sensor Networks", chapter 12 in Security in Sensor Networks, Yang Xiao (editor), CRC Press, 2006

    Journal papers:

  4. Bahman Rashidi, Carol Fung and Elisa Bertino. "A Collaborative DDoS Defence Framework using Network Function Virtualization". IEEE Transaction on Information Forensics & Security (TIFS). 2017. Impact factor: 2.44 PDF BibTeX

  5. Bahman Rashidi, Carol Fung and Elisa Bertino. "Android Resource Usage Risk Assessment using Hidden Markov Model and Online Learning". Elsevier Computers & Security (COSE). 2017. Impact factor: 1.64 PDF BibTeX

  6. Carol Fung and Quanyan zhu. "FACID: A Trust-based Collaborative Decision Framework for Intrusion Detection Networks". Elsevier Ad Hoc Networks Journal (ADHOC). 2016. Impact factor: 1.66 PDF BibTeX

  7. Molka Gharbaouia, Barbara Martini, Carol Fung, Francesco Paolucci, Alessio Giorgetti, and Piero Castoldi. "An Incentive-compatible and Trust-aware Multi-Provider Path Computation Element (PCE)". Elsevier Computer Networks (COMNET). 2016. Impact factor: 1.4 PDF BibTeX

  8. Bahman Rashidi, Carol Fung, and Tam Vu. "Android Fine-grained Permission Control System with Real-Time Expert Recommendations". Elsevier Pervasive and Mobile Computing. 2016. Impact factor: 1.7 PDF BibTeX

  9. Bahman Rashidi, and Carol Fung, "A Survey of Android Security Threats and Defenses". In Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 6, No. 3, September 2015. PDF BibTeX

  10. Bahman Rashidi, and Carol Fung, "Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model". In Journal of Internet Services and Information Security (JISIS), Vol. 5, No. 2, May 2015. PDF BibTeX

  11. Quanyan Zhu, Carol J. Fung, Raouf Boutaba, and Tamer Barsar. GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks. In IEEE Journal on Selected Areas in Communications, special issue on Economics of Communication Networks & Systems. 2012. PDF BibTeX

  12. C. Fung, J. Zhang and R. Boutaba. Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks. In IEEE Transactions on Network and Service Management. March 2012. PDF BibTeX

  13. C. Fung. "Collaborative Intrusion Detection Networks and Insider Attacks", Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol 2(1), pp. 63-74, 2011. PDF BibTeX

  14. Carol J. Fung, Jie Zhang, and Raouf Boutaba. "Dirichlet-based Trust Management for Effective Collaborative Intrusion Detection Networks". IEEE Transaction on Network Service and Management (TNSM), Vol. 8(2), pp. 79-91, 2011. PDF BibTeX

  15. Carol J. Fung, Jie Zhang, Issam Aib, and Raouf Boutaba. "Trust Management and Admission Control for Host-based Collaborative Intrusion Detection". Journal of Network and Systems Management (JNSM), Vol. 19(2), pp. 257-277, 2010. PDF BibTeX

  16. J. Misic , C.J. Fung, "The impact of master-slave bridge access mode on the performance of multi-cluster 802.15.4 network", Elsevier's Computer Networks, 2007

  17. J. Misic, V. B. Misic, C. J. Fung, and S. Shafi. "Faster lanes, longer lifetimes: activity management in interconnected 802.15.4 sensor clusters", Mobile Networks and Applications Journal (MONET), 2006

  18. J. Misic, C. J. Fung, and V. B. Misic. "Interconnecting 802.15.4 clusters in master-slave mode using guaranteed time slots and acknowledged transfers: queueing theoretic analysis", Journal of Interconnection Networks, 2006

    Conference and Workshop papers:

  19. Bahman Rashidi, Carol Fung and Elisa Bertino. "Android Malicious Application Detection Using Support Vector Machine and Active Learning". 2017 IEEE/IFIP International Conference on Network and Service Management(CNSM'17).(17% acceptance rate)

  20. Shaohan Huang, Carol Fung, Shupeng Zhang, Guang Wei, Zhongzhi Luan and Depei Qian. "Arena: adaptive real-time update anomaly prediction in cloud systems". 2017 IEEE/IFIP International Conference on Network and Service Management(CNSM'17).(17% acceptance rate)

  21. A h m Jakaria, Mohammad Ashiqur Rahman and Carol Fung. "Automated Synthesis of NFV Topology: A Security Requirement-Oriented Design". 2017 IEEE/IFIP International Conference on Network and Service Management(CNSM'17). Short paper.

  22. Shupeng Zhang, Carol Fung, Shaohan Huang, Zhongzhi Luan and Depei Qian. "PSOM: Periodic Self-Organizing Maps for Unsupervised Anomaly Detection in Periodic Time Series". 2017 IEEE/ACM International Symposium on Quality of Service (IWQoS'17).

  23. Seyyit Alper Sert, Adnan Yazici, Carol Fung and George Roy. "An Efficient Fuzzy Path Selection Approach to Mitigate Selective Forwarding Attacks in Wireless Sensor Networks". IEEE International Conference on Fuzzy Systems 2017 (FUZZ-IEEE'17).

  24. Pulkit Rustgi, Carol Fung, Bahman Rashidi, and Bridget McInnes. "DroidVisor: An Android Secure Application Recommendation System". In 3RD IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT'17).

  25. A H M Jakaria, Bahman Rashidi, Mohammad A. Rahman, Carol Fung, and Wei Yang. "Dynamic DDoS defense resource allocation using Network Function Virtualization". In ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFV Security'17).

  26. Hui Yu, Jiahai Yang, and Carol Fung. "SpongeNet+: A Two-layer Bandwidth Allocation Framework for Cloud Datacenter". In 18th International Conferences on High Performance Computing and Communications. 2016. (HPCC'16)

  27. Bahman Rashidi and Carol Fung. "CoFence: A Collaborative DDoS Defence Using Network Function Virtualization". In 12th International Conference on Network and Service Management. 2016. mini conf. (CNSM'16) (25% acceptance rate) PDF BibTeX

  28. Bahman Rashidi and Carol Fung. "XDroid: An Android Permission Control Using Hidden Markov Chain and Online Learning". In IEEE Conference on Communications and Network Security 2016 (CNS'16) (29% acceptance rate) PDF BibTeX

  29. Bahman Rashidi, Carol Fung, Ann Nguyen, and Tam Vu. "Android Permission Recommendation using Transitive Bayesian Inference Model". In the 21st European Symposium on research in computer security 2016 (ESORICS'16) (21% acceptance rate) PDF BibTeX

  30. Shaohan Huang, Carol Fung, Kui Wang, Polo Pei, Zhongzhi Luan, and Depei Qian. "Using Recurrent Neural Networks Toward Black-Box System Anomaly Prediction" In IEEE/ACM International Symposium on Quality of Service 2016 (IWQoS'16) (20% acceptance rate) PDF BibTeX

  31. A H M Jakaria, Wei Yang, Bahman Rashidi, Carol Fung, and M. Ashiqur Rahman. "VFence: A Defense against Distributed Denial of Service Attacks using Network Function Virtualization" In the 11th IEEE International Workshop on Security, Trust, and Privacy for Software Applications(STPSA 2016). (32.5% acceptance rate) PDF BibTeX

  32. Wei Yang and Carol Fung. "A survey on security in network functions virtualization" In IEEE Conference on Network Softwarization(Netsoft'16). Seoul, Korea. Short paper. (37% acceptance rate) PDF BibTeX

  33. Bahman Rashidi and Carol Fung. "BotTracer: Bot User Detection Using Clustering Method in RecDroid." In IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies 2016 (DISSECT'16). Istanbul, Turkey. (40% acceptance rate) PDF BibTeX

  34. Huanhuan Zhang, Jie Zhang, Carol Fung and Chang Xu. "Improving Sybil Detection via Graph Pruning and Regularization Techniques". In 7th Asian Conference on Machine Learning (ACML). November, 2015, Hong Kong. PDF BibTeX

  35. Carol Fung and Bill McCormick. "VGuard: A Distributed Denial of Service Attack Mitigation Method using Network Function Virtualization". In 11th International Conference on Networks and Sevice Management (CNSM'15). Mini Conference Track. Barcelona, Spain. PDF BibTeX

  36. Shaohan Huang, Carol Fung, Kui Wang, Yaqi Yang, Zhongzhi Luan, and Depei Qian. "Revisit Network Anomaly Ranking in Datacenter Network Using Re-ranking". In 4th IEEE International Conference on Cloud Computing (CloudNet'15). Niagara Falls, Canada. PDF BibTeX

  37. Andrzej Kamisiński, and Carol Fung. "FlowMon: Detecting Malicious Switches in Software-Defined Networks". In ACM CCS workshop on Automated Decision Making for Active Cyber Defense 2015 (Safeconfig 2015). Denver, Colorado. PDF BibTeX

  38. Bahman Rashidi, Carol Fung, Gerrit Bond, Steven Jackson, Marcus Pare, and Tam Vu. "RecDroid: An Android Resource Access Permission Recommendation System." ACM MobiHoc 2015. Demo paper. Hangzhou, China. PDF BibTeX

  39. Chao Ding, Carol Fung, Kui Wang, Polo Peiz, You Meng, Zhongzhi Luan, Depei Qian. "A Methodology for Root-cause Analysis in Component Based Systems." IEEE/ACM International Symposium on Quality of Service (IWQoS) 2015. Short paper. Portland, Oregon.

  40. Bahman Rashidi and Carol Fung. "A Game-Theoretic Model for Defending Against Malicious Users in RecDroid." Proceedings of the IEEE/IFIP IM2015 Workshop on Security for Emerging Distributed Network Technologies (DISSECT'15).PDF BibTeX

  41. Lei Wei and Carol Fung. FlowRanger: "A Request Prioritizing Algorithm for Controller DoS Attacks in Software Defined Networks." IEEE International Conference on Communications (ICC 2015). London, UK. PDF BibTeX

  42. Ioana Bara, Carol Fung, and Thang Dihn. "Enhancing Twitter Spam Accounts Discovery Using Cross-Account Pattern Mining." IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Mini Conference. Ottawa, Canada. PDF BibTeX

  43. Bahman Rashidi, Carol Fung, and Tam Vu. "Dude, Ask The Experts!: Resource Access Permission Recommendation with RecDroid." IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Main Track. Ottawa, Canada. PDF BibTeX

  44. Bahman Rashidi, Carol Fung, and Tam Vu, “RecDroid: A Resource Access Permission Control Portal and Recommendation Service for Smartphone Users”. Workshop on Security and Privacy Aspects of Mobile Environment. 2014 (SPME14).PDF BibTeX

  45. Carol Fung, M. Gharbaoui, F. Paolucci, A. Giorgetti, P. Castoldi, and B. Martini, “Quality of Interaction among Path Computation Elements for Trust-aware Inter-Provider Cooperation”. IEEE International Conference on Communications (ICC14), Sydney, Australia, 2014.PDF BibTeX

  46. Carol Fung, Disney Lam, and Raouf Boutaba, “RevMatch: An Efficient and Robust Decision Model for Collaborative Malware Detection”. IEEE/IFIP Network Operation and Management Symposium (NOMS14). Krakow, Poland, 2014.PDF BibTeX

  47. Carol Fung, Raouf Boutaba, "Design and Management of Collaborative Intrusion Detection Networks". The 15th IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). Diseration Papaer. Ghent, Belgium, 2013. Best Disertation Award PDF BibTeX

  48. Carol J Fung, Quanyan Zhu, Raouf Boutaba, and Tamer Basar, "SMURFEN: A Framework of Knowledge Sharing for Collaborative Intrusion Detection", in the 7th international Conference on Network and Service Management, mini conference. 2011 PDF BibTeX

  49. Quanyan Zhu, Carol J Fung, Raouf Boutaba, and Tamer Basar, "A Game-Theoretic Approach to Knowledge Sharing in Distributed Collaborative Intrusion Detection Networks: Fairness, Incentives and Security", in the 50th IEEE Conference on Decision and Control and European Control Conference, 2011 PDF BibTeX

  50. Carol J Fung, Jie Zhang, and Raouf Boutaba. "Effective Acquaintance Management for Collaborative Intrusion Detection Networks", 6th International Conference on Network and Service Management (CNSM 2010). Niagara Fall, Canada. Best Student Paper Award PDF BibTeX

  51. Quanyan Zhu, Carol J. Fung, Raouf Boutaba, and Tamer Basar. "A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks", IEEE International Conference on Communications(ICC 2010). Cape Town, South Africa. PDF BibTeX

  52. Carol J. Fung, Quanyan Zhu, Raouf Boutaba, and Tamer Basar. "Bayesian Decision Aggregation in Collaborative Intrusion Detection Networks", IEEE/IFIP Network Operations and Management Symposium (NOMS 2010). Osaka, Japan. PDF BibTeX

  53. Carol J Fung, Jie Zhang, Issam Aib, Raouf Boutaba, Robin Cohen. "Design of a Simulation Framework to Evaluate Trust Models for Collaborative Intrusion Detection", IFIP Network and Service Security Conference (N2S 09). Paris, France. PDF BibTeX

  54. Quanyan Zhu, Carol Fung, Raouf Boutaba, Tamer Basar. "A Game-Theoretical Approach to Incentive Design in Collaborative Intrusion Detection Networks", International Conference on Game Theory for Networks (GameNets 09). Istanbul, Turkey. PDF BibTeX

  55. Carol J. Fung, Jie Zhang, Issam Aib, and Raouf Boutaba. "Robust and Scalable Trust Management for Collaborative Intrusion Detection". The 11th IFIP/IEEE International Symposium on Integrated Network Management (IM 2009). New York, US. Best Paper Award PDF BibTeX

  56. Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, and Raouf Boutaba. "Trust Management for Host-based Collaborative Intrusion Detection". International Workshop on Distributed Systems: Operations and Management 2008 (DSOM'08). Samos, Greece. PDF BibTeX

  57. Carol J. Fung, Yanni Ellen Liu. "Lifetime Estimation of Large LR-WPAN Sensor Networks", IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems 2008 (MASCOTS'08). Baltimore, US. PDF

  58. Jelena Misic, Carol J. Fung, Vojislav B. Misic "On Node Population in a Multi-Level 802.15.4 Sensor Network",IEEE Global Communications Conference (GLOBECOM'06) 2006

  59. Jelena Misic, Carol J. Fung, Vojislav B. Misic "On Bridge Residence Times in Master-Slave Connected 802.15.4 Clusters", 20th International Conference on Advanced Information Networking and Applications (AINA'06)

  60. Jelena Misic, Carol J. Fung, Vojislav B. Misic "Network Lifetime Equalization in Interconnected 802.15.4 Clusters",The Third International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks(Qshine2006)

  61. Jelena Misic, J. Fung, and Vojislav Misic "Interconnecting 802.15.4 Clusters in Slotted CSMA-CA Mode", IEEE International Conferernce on Communications 2006(ICC'06)

  62. J. Misic, J. Fung, and V. B. Misic. "Interconnecting 802.15.4 clusters in master-slave mode: queueing theoretic analysis", The International Symposium on Parallel Architectures, Algorithms, and Networks, 2005 (I-SPAN 2005),

  63. V. B. Misic, J. Fung, and J. Misic. "MAC Layer Security of 802.15.4-Compliant Networks", International Workshop on Wireless and Sensor Network Security 2005 (WSNS'05)

    Posters:

  64. Carol J Fung, Disney Lam, and Raouf Boutaba, "REM: A Robust and Efficient Decision Model for Collaborative Malware Detection", USENIX Security 2013, Washington DC, USA

  65. Carol J Fung, Quanyan Zhu, Raouf Boutaba, and Tamer Basar, "Knowledge Sharing and Propagation in Collaborative Intrusion Detection Networks", GameSec 2012, Budapest, Hungary.

  66. Carol J Fung, Quanyan Zhu, Raouf Boutaba, and Tamer Basar, "SMURFEN: A Rule Sharing Collaborative Intrusion Detection Network", 18th ACM Conference on Computer and Communications Security (CCS), 2011. Chicago, IL, USA