scispace - formally typeset
P

Po-Ching Lin

Researcher at National Chung Cheng University

Publications -  47
Citations -  942

Po-Ching Lin is an academic researcher from National Chung Cheng University. The author has contributed to research in topics: Computer science & Network packet. The author has an hindex of 15, co-authored 37 publications receiving 655 citations. Previous affiliations of Po-Ching Lin include National Chiao Tung University.

Papers
More filters
Journal ArticleDOI

Security and privacy for 6G: A survey on prospective technologies and challenges

TL;DR: In this article, the authors provide a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses.
Journal ArticleDOI

Using String Matching for Deep Packet Inspection

TL;DR: String matching has sparked renewed research interest due to its usefulness for deep packet inspection in applications such as intrusion detection, virus scanning, and Internet content filtering.
Journal ArticleDOI

Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems

TL;DR: The results indicate that duplicate insertion becomes less effective on recent systems, but packet splitting, payload mutation and shellcode mutation can be still effective against them.
Journal ArticleDOI

Review: Application classification using packet size distribution and port association

TL;DR: This work proposes a method to classify traffic by analyzing the variances of packet sizes of the connections without analyzing packet payload that works well for encrypted traffic but also can be easily incorporated with a signature-based method to provide better accuracy.
Journal ArticleDOI

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

TL;DR: In this article, the authors provide a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses.