Ching-Hao Mao
According to our database1,
Ching-Hao Mao
authored at least 31 papers
between 2004 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
2004
2006
2008
2010
2012
2014
2016
2018
0
1
2
3
4
5
6
7
1
1
1
3
2
1
2
2
1
5
1
3
2
2
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Identifying HID-based attacks through process event graph using guilt-by-association analysis.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural Network.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
2017
Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation.
Soft Comput., 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
Sec-Buzzers: a Web Service for Exploring Cyber Security Emerging Topics based on Social Network Mining.
Proceedings of the ASE BigData & SocialInformatics 2015, 2015
2014
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
Proceedings of the Intelligent Systems and Applications, 2014
2013
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
2012
An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection.
J. Inf. Sci. Eng., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Cloud SSDLC: Cloud Security Governance Deployment Framework in Secure System Development Life Cycle.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
J. Netw. Comput. Appl., 2011
Proceedings of the IEEE International Conference on Systems, 2011
2010
Proceedings of the Proceedings Fourth International Workshop on Testing, 2010
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010
Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection.
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Proceedings of the IEEE International Conference on Systems, 2009
Semi-supervised co-training and active learning based approach for multi-view intrusion detection.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
2007
Proceedings of the 2007 Workshop on Large Scale Attack Defense, 2007
A Self-adaptive Evolutionary Negative Selection Approach for Home Anomaly Events Detection.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
2006
Network Motif Model: An Efficient Approach for Extracting Features from Relational Data.
Proceedings of the IEEE International Conference on Systems, 2006
Semantic Similarity Measurement of Chinese Financial News Titles Based on Event Frame Extracting.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006
2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
2004
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004