Matching tcp packets and its application to the detection of long connection chains on the internet J Yang, SHS Huang Advanced Information Networking and Applications, 2005. AINA 2005. 19th …, 2005 | 72 | 2005 |
A real-time algorithm to detect long connection chains of interactive terminal sessions J Yang, SHS Huang Proceedings of the 3rd international conference on Information security, 198-203, 2004 | 71 | 2004 |
Mining TCP/IP packets to detect stepping-stone intrusion J Yang, SHS Huang computers & security 26 (7-8), 479-484, 2007 | 55 | 2007 |
A clustering-partitioning algorithm to find TCP packet round-trip time for intrusion detection J Yang, SHS Huang, MD Wan 20th International Conference on Advanced Information Networking and …, 2006 | 47 | 2006 |
Neural networks-based detection of stepping-stone intrusion HC Wu, SHS Huang Expert Systems with Applications 37 (2), 1431-1437, 2010 | 44 | 2010 |
Parallel dynamic programming SHS Huang, H Liu, V Viswanathan IEEE transactions on parallel and distributed systems 5 (3), 326-328, 1994 | 38 | 1994 |
Optimal binary split trees SHS Huang, CK Wong Journal of Algorithms 5 (1), 69-79, 1984 | 33 | 1984 |
Faster construction of optimal binary split trees JH Hester, DS Hirschberg, SHS Huang, CK Wong Journal of Algorithms 7 (3), 412-424, 1986 | 28 | 1986 |
Generalized binary split trees SHS Huang, CK Wong Acta informatica 21 (1), 113-123, 1984 | 28 | 1984 |
A sublinear parallel algorithm for some dynamic programming problems SHS Huang, H Liu, V Viswanathan Theoretical Computer Science 106 (2), 361-371, 1992 | 27 | 1992 |
Integrating windows streaming media technologies into a virtual classroom environment S Huang, H Hu Proceedings International Symposium on Multimedia Software Engineering, 411-418, 2000 | 26 | 2000 |
Detecting stepping-stone intruders with long connection chains W Ding, MJ Hausknecht, SHS Huang, Z Riggle 2009 Fifth International Conference on Information Assurance and Security 2 …, 2009 | 20 | 2009 |
An algorithm to detect stepping-stones in the presence of chaff packets YW Kuo, SHS Huang 2008 14th IEEE International Conference on Parallel and Distributed Systems …, 2008 | 20 | 2008 |
Parallel dynamic programming V Viswanathan, SHS Huang, H Liu Proceedings of the Second IEEE Symposium on Parallel and Distributed …, 1990 | 20 | 1990 |
SAMAF: Sequence-to-sequence Autoencoder Model for Audio Fingerprinting A Báez-Suárez, N Shah, JA Nolazco-Flores, SHS Huang, O Gnawali, ... ACM Transactions on Multimedia Computing, Communications, and Applications …, 2020 | 19 | 2020 |
Detecting masqueraders using high frequency commands as signatures MD Wan, HC Wu, YW Kuo, J Marshall, SHS Huang 22nd International Conference on Advanced Information Networking and …, 2008 | 19 | 2008 |
Stepping-stone detection algorithm based on order preserving mapping YW Kuo, S Huang 2007 International Conference on Parallel and Distributed Systems, 1-8, 2007 | 18 | 2007 |
Detecting stepping-stone with Chaff perturbations HC Wu, SHS Huang 21st International Conference on Advanced Information Networking and …, 2007 | 18 | 2007 |
User behavior analysis in masquerade detection using principal component analysis HC Wu, SHS Huang 2008 Eighth International Conference on Intelligent Systems Design and …, 2008 | 17 | 2008 |
Monitoring network traffic to detect stepping-stone intrusion J Yang, B Lee, SSH Huang 22nd International Conference on Advanced Information Networking and …, 2008 | 17 | 2008 |