Lam-for Kwok
Orcid: 0000-0001-8208-9659Affiliations:
- City University of Hong Kong
According to our database1,
Lam-for Kwok
authored at least 90 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Blended Learning. Intelligent Computing in Education, 2024
2023
Online learning and blended learning: new practices derived from the pandemic-driven disruption.
J. Comput. High. Educ., April, 2023
2022
Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions.
IEEE Commun. Surv. Tutorials, 2022
2021
Interact. Learn. Environ., 2021
Interact. Learn. Environ., 2021
2020
Proceedings of the Blended Learning. Education in a Smart Learning Environment, 2020
2019
Learning engagement via promoting situational interest in a blended learning environment.
J. Comput. High. Educ., 2019
Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis.
J. Inf. Secur. Appl., 2019
Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2019
2018
Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Future Internet, 2018
Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks.
Clust. Comput., 2018
Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems.
IEEE Access, 2018
Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Blended Learning. Enhancing Learning Success, 2018
2017
Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments.
IEEE Trans. Netw. Serv. Manag., 2017
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model.
J. Netw. Comput. Appl., 2017
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.
Comput. Secur., 2017
A Review of Learning Behaviors in Using E-Schoolbag: Enhancing Academic Performance in Primary Chinese.
Proceedings of the Blended Learning. New Challenges and Innovative Practices, 2017
SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
2016
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures.
J. Netw. Comput. Appl., 2016
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection.
Comput. Secur., 2016
PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Network and System Security - 10th International Conference, 2016
Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016
Proceedings of the Blended Learning: Aligning Theory with Practices, 2016
2015
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection.
Secur. Commun. Networks, 2015
Proceedings of the Hybrid Learning: Innovation in Educational Practices, 2015
A Study of an E-schoolbag Supporting Flipped Classroom Model for Junior Mathematics Review Class.
Proceedings of the Hybrid Learning: Innovation in Educational Practices, 2015
2014
Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection.
J. Netw. Comput. Appl., 2014
The effect of adaptive mechanism on behavioural biometric based mobile phone authentication.
Inf. Manag. Comput. Secur., 2014
EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism.
Comput. Secur., 2014
Adaptive non-critical alarm reduction using hash-based contextual signatures in intrusion detection.
Comput. Commun., 2014
Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones.
Proceedings of the Symposium on Applied Computing, 2014
An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments.
Proceedings of the Information Security - 17th International Conference, 2014
Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014
Proceedings of the Hybrid Learning. Theory and Practice - 7th International Conference, 2014
Enhancing email classification using data reduction and disagreement-based semi-supervised learning.
Proceedings of the IEEE International Conference on Communications, 2014
2013
Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection.
Int. J. Comput. Intell. Syst., 2013
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection.
Comput. Networks, 2013
Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection.
Proceedings of the Network and System Security - 7th International Conference, 2013
Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2013
Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
A Case Review on the Implementation of Intelligent Tutoring Systems on Mobile Devices.
Proceedings of the Hybrid Learning and Continuing Education - 6th International Conference, 2013
Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
J. Zhejiang Univ. Sci. C, 2012
Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection.
Proceedings of the Security and Privacy in Communication Networks, 2012
Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection.
Proceedings of the Network and System Security - 6th International Conference, 2012
Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection.
Proceedings of the Foundations of Intelligent Systems - 20th International Symposium, 2012
A case study: Intelligent false alarm reduction using fuzzy if-then rules in network intrusion detection.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2011
Proceedings of the Hybrid Learning - 4th International Conference, 2011
A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Advances in Web-Based Learning - ICWL 2010, 2010
2009
Proceedings of the Artificial Intelligence in Education: Building Learning Systems that Care: From Knowledge Representation to Affective Modelling, 2009
2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
2006
Proceedings of the Advances in Web Based Learning, 2006
2005
A cognitive tool for teaching the addition/subtraction of common fractions: a model of affordances.
Comput. Educ., 2005
Proceedings of the Towards Sustainable and Scalable Educational Innovations Informed by the Learning Sciences, 2005
A cognitive tool in handheld devices for collaborative learning: comprehending procedural knowledge of the addition of common fractions.
Proceedings of the Next 10 Years! Proceedings of the 2005 Conference on Computer Support for Collaborative Learning, 2005
2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Security and Protection in Information Processing Systems, 2004
2003
A graphical partitioning model for learning common fraction: designing affordances on a web-supported learning environment.
Comput. Educ., 2003
Proceedings of the 2003 Computer Graphics International (CGI 2003), 2003
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003
2002
Modeling the Process of Learning Common Fraction Operation: Designing an Internet-Based Integrated Learning Environment for Knowledge Construction.
Proceedings of the International Conference on Computers in Education, 2002
2001
Integrating security design into the software development process for e-commerce systems.
Inf. Manag. Comput. Secur., 2001
Security Documentation.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001
1999
Comput. Educ., 1999
1997
Inf. Manag. Comput. Secur., 1997
Code of Practice: A Standard for Information Security Management.
Proceedings of the Information Security in Research and Business, 1997
1996
Proceedings of the Australian New Zealand Conference on Intelligent Information Systems, 1996
1995
1994
Automated Testing Tool for Natural<sup>®</sup>.
Proceedings of the Software Quality and Productivity: Theory, 1994
1993
New Metrics for Automated Programming Assessment.
Proceedings of the Software Engineering Education, Proceedings of the IFIP WG3.4/SEARCC (SRIG on Education and Training) Working Conference, Hong Kong, 28 September, 1993
1992
Upgrading IT Professionals in Hong Kong.
Proceedings of the Professional Development of Information Technology Professionals, 1992