Research explorer tool

Date


People

Output Type

Download Available

3 results

On privacy aware carriers for value-possessed e-invoices considering intelligence mining

Journal Article
Cha, S., Wang, H., Tan, Z., Joung, Y., Tseng, Y., & Yeh, K. (in press)
On privacy aware carriers for value-possessed e-invoices considering intelligence mining. IEEE Transactions on Emerging Topics in Computational Intelligence,
Intelligence mining is one of the most promising technologies for effectively extracting intelligence (and knowledge) to enhance the quality of decision-making. In Taiwan, the...

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm

Journal Article
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914
Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification bu...

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques

Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...