Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
---|---|---|---|---|---|---|
2013 | A Cooperative Botnet Profiling and Detection in Virtualized Environment | Shun-Wen Hsiao; Yi-Ning Chen; Yeali S. Sun; Meng Chang Chen | ||||
2008 | A Distributed Channel Access Scheduling Scheme with Clean-Air Spatial Reuse for Wireless Mesh Networks | Yuan-Chieh Lin; Shun-Wen Hsiao; Li-Ping Tung; Yeali S. Sun; Meng Chang Chen | ||||
2011 | A Secure Proxy-Based Cross-Domain Communication for Web Mashups | Shun-Wen Hsiao; Yeali Sun; Fu-Chi Ao; Meng Chang Chen | ||||
2013 | A Security Proxy-Based Cross-Domain Communication for Web Mashups | Shun-Wen Hsiao; Yeali S. Sun; Meng Chang Chen | Journal of Web Engineering 12(3-4), 291-316 | |||
2016 | Behavior Grouping of Android Malware Family | Shun-Wen Hsiao; Yeali. S. Sun; Meng Chang Chen | ||||
2010 | Behavior Profiling for Robust Anomaly Detection | Shun-Wen Hsiao; Yeali S. Sun; Meng Chang Chen; Hui Zhang | ||||
2013 | Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments | Shun-Wen Hsiao; Yi-Ning Chen; Yeali S. Sun; Meng Chang Chen | ||||
2010 | Cross-Level Behavioral Analysis for Robust Early Intrusion Detection | Shun-Wen Hsiao; Yeali S. Sun; Meng Chang Chen; Hui Zhang | ||||
2020 | Hardware-Assisted MMU Redirection for In-guest Monitoring and API Profiling | Shun-Wen Hsiao; Yeali Sun; Meng Chang Chen | IEEE Transactions on Information Forensics and Security 15, 2402-2416 | |||
2016 | Model-Based Anomaly Detection on Network Services | Shun-Wen Hsiao; Yeali S. Sun; Meng Chang Chen; Hui Zhang | TR-IIS-16-002 | |||
2009 | Scalable Long-term Network Forensics for Epidemic Attacks | Li-Ming Chen; Meng Chang Chen; Yeali S. Sun; Shun-Wen Hsiao; Vyas Sekar; Hui Zhang | ||||
2016 | Slow-Paced Persistent Network Attacks Analysis and Detection Using Spectrum Analysis | Li-Ming Chen; Shun-Wen Hsiao; Meng Chang Chen; WanJiun Liao | IEEE Systems Journal 10(4), 1326-1337 |