Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
---|---|---|---|---|---|---|
2015 | Discover the dynamics of a zero-day vulnerability | Yennun Huang; Shin-Ying Huang | JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS 88(4), pp84-94 | |||
2014 | Event Pattern Discovery on IDS Traces of Cloud Services | Shin-Ying Huang; Yennun Huang; Neeraj Suri | ||||
2018 | Exploring the Relationship Between Dimensionality Reduction and Private Data Release | Bo-Chen Tai; Szu-Chuang Li; Yennun Huang; Neeraj Suri; Pang-Chieh Wang | ||||
2012 | Holography: a behavior-based profiler for malware analysis | Shih-Yao Dai; Yarochkin Fyodor; Ming-Wei Wu; Yennun Huang; Sy-Yen Kuo | Software: Practice and Experience 42, 1107-1136 | |||
2013 | Investigating DNS traffic anomalies for malicious activities | Fyodor Yarochkin; Sy-Yen Kuo; Yennun Huang; Vladimir Kropotov | ||||
2013 | Mining Large Network Reconnaissance Data | Fyodor Yarochkin; Yennun Huang; Yung-Li Hu; Sy-Yen Kuo | ||||
2013 | Network forensic analysis using growing hierarchical SOM | Shin-Ying Huang; Yennun Huang | ||||
2015 | Network-Traffic Anomaly Detection with Incremental Majority Learning | Shin-Ying Huang; Fang Yu; Rua-Huan Tsaih; Yennun Huang | ||||
2015 | New Techniques for Streaming Authenticated Data Structures | Chia-Mu Yu; Shin-Ying Huang; Yennun Huang | ||||
2014 | PCTopk: Privacy- and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-tiered Sensor Networks | Yao-Tung Tsou; Yung-Li Hu; Yennun Huang; Sy-Yen Kuo | ||||
2014 | Resistant Learning on the Envelope Bulk for Identifying Anomalous Patterns | Shin-Ying Huang; Fang Yu; Rua-Huan Tsaih; Yennun Huang |