Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
---|---|---|---|---|---|---|
2015 | Discover the dynamics of a zero-day vulnerability | Yennun Huang; Shin-Ying Huang | JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS 88(4), pp84-94 | |||
2014 | Event Pattern Discovery on IDS Traces of Cloud Services | Shin-Ying Huang; Yennun Huang; Neeraj Suri | ||||
2013 | Network forensic analysis using growing hierarchical SOM | Shin-Ying Huang; Yennun Huang | ||||
2013 | Network traffic anomaly detection based on growing hierarchical SOM | Shin-Ying Huang; Yen-Nun Huang | ||||
2015 | Network-Traffic Anomaly Detection with Incremental Majority Learning | Shin-Ying Huang; Fang Yu; Rua-Huan Tsaih; Yennun Huang | ||||
2015 | New Techniques for Streaming Authenticated Data Structures | Chia-Mu Yu; Shin-Ying Huang; Yennun Huang | ||||
2014 | Resistant Learning on the Envelope Bulk for Identifying Anomalous Patterns | Shin-Ying Huang; Fang Yu; Rua-Huan Tsaih; Yennun Huang |