Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
---|---|---|---|---|---|---|
2013 | Investigating DNS traffic anomalies for malicious activities | Fyodor Yarochkin; Sy-Yen Kuo; Yennun Huang; Vladimir Kropotov | ||||
2013 | Mining Large Network Reconnaissance Data | Fyodor Yarochkin; Yennun Huang; Yung-Li Hu; Sy-Yen Kuo | ||||
2013 | Network forensic analysis using growing hierarchical SOM | Shin-Ying Huang; Yennun Huang | ||||
2015 | Network-Traffic Anomaly Detection with Incremental Majority Learning | Shin-Ying Huang; Fang Yu; Rua-Huan Tsaih; Yennun Huang | ||||
2015 | New Techniques for Streaming Authenticated Data Structures | Chia-Mu Yu; Shin-Ying Huang; Yennun Huang | ||||
2014 | PCTopk: Privacy- and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-tiered Sensor Networks | Yao-Tung Tsou; Yung-Li Hu; Yennun Huang; Sy-Yen Kuo | ||||
2014 | Resistant Learning on the Envelope Bulk for Identifying Anomalous Patterns | Shin-Ying Huang; Fang Yu; Rua-Huan Tsaih; Yennun Huang |