Lam-for Kwok

Orcid: 0000-0001-8208-9659

Affiliations:
  • City University of Hong Kong


According to our database1, Lam-for Kwok authored at least 90 papers between 1992 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Analysis of Cyber Range Scenario Design - -A Case Study.
Proceedings of the Blended Learning. Intelligent Computing in Education, 2024

2023
Online learning and blended learning: new practices derived from the pandemic-driven disruption.
J. Comput. High. Educ., April, 2023

2022
Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions.
IEEE Commun. Surv. Tutorials, 2022

2021
CRESDA: towards a personalized student advisory for professional development.
Interact. Learn. Environ., 2021

In search of the good practices of personalized learning.
Interact. Learn. Environ., 2021

2020
Developing 21st-Century Competencies for Job Readiness.
Proceedings of the Blended Learning. Education in a Smart Learning Environment, 2020

2019
Learning engagement via promoting situational interest in a blended learning environment.
J. Comput. High. Educ., 2019

Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis.
J. Inf. Secur. Appl., 2019

Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2019

2018
Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Future Internet, 2018

Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks.
Clust. Comput., 2018

Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems.
IEEE Access, 2018

Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Cultivating Situational Interest in Blended Learning Environment.
Proceedings of the Blended Learning. Enhancing Learning Success, 2018

2017
Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments.
IEEE Trans. Netw. Serv. Manag., 2017

Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model.
J. Netw. Comput. Appl., 2017

Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.
Comput. Secur., 2017

A Review of Learning Behaviors in Using E-Schoolbag: Enhancing Academic Performance in Primary Chinese.
Proceedings of the Blended Learning. New Challenges and Innovative Practices, 2017

SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures.
J. Netw. Comput. Appl., 2016

MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection.
Comput. Secur., 2016

PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Network and System Security - 10th International Conference, 2016

Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

A Study of Scientific Inquiry Activities in Smart Classrooms of a Primary School.
Proceedings of the Blended Learning: Aligning Theory with Practices, 2016

2015
A vision for the development of i-campus.
Smart Learn. Environ., 2015

Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection.
Secur. Commun. Networks, 2015

Research on Problem-Oriented Instruction Mode Supported by Electronic Schoolbag.
Proceedings of the Hybrid Learning: Innovation in Educational Practices, 2015

A Study of an E-schoolbag Supporting Flipped Classroom Model for Junior Mathematics Review Class.
Proceedings of the Hybrid Learning: Innovation in Educational Practices, 2015

2014
Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection.
J. Netw. Comput. Appl., 2014

The effect of adaptive mechanism on behavioural biometric based mobile phone authentication.
Inf. Manag. Comput. Secur., 2014

EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism.
Comput. Secur., 2014

Adaptive non-critical alarm reduction using hash-based contextual signatures in intrusion detection.
Comput. Commun., 2014

Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones.
Proceedings of the Symposium on Applied Computing, 2014

An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments.
Proceedings of the Information Security - 17th International Conference, 2014

Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Developing Knowledge Clusters in a Supportive Learning Environment.
Proceedings of the Hybrid Learning. Theory and Practice - 7th International Conference, 2014

Enhancing email classification using data reduction and disagreement-based semi-supervised learning.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection.
Int. J. Comput. Intell. Syst., 2013

Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection.
Comput. Networks, 2013

Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Evolving a Secure Internet.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection.
Proceedings of the Network and System Security - 7th International Conference, 2013

Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2013

Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Case Review on the Implementation of Intelligent Tutoring Systems on Mobile Devices.
Proceedings of the Hybrid Learning and Continuing Education - 6th International Conference, 2013

Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Building an e-Portfolio with a learning plan centric approach.
J. Zhejiang Univ. Sci. C, 2012

Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection.
Proceedings of the Security and Privacy in Communication Networks, 2012

Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection.
Proceedings of the Network and System Security - 6th International Conference, 2012

Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection.
Proceedings of the Foundations of Intelligent Systems - 20th International Symposium, 2012

A case study: Intelligent false alarm reduction using fuzzy if-then rules in network intrusion detection.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
Data Modeling Technique Made Easy with Hybrid Learning Computer Aided Instruction.
Proceedings of the Hybrid Learning - 4th International Conference, 2011

A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
A Business Continuity Management Simulator.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Assisting the Authoring Process of IMS-LD Using Web Parsing Technique.
Proceedings of the Advances in Web-Based Learning - ICWL 2010, 2010

2009
Developing an ITS in Sudoku.
Proceedings of the Artificial Intelligence in Education: Building Learning Systems that Care: From Knowledge Representation to Affective Modelling, 2009

2008
Feasibility of Automated Information Security Compliance Auditing.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2006
A technique for expressing IT security objectives.
Inf. Softw. Technol., 2006

A Survey on Using IT in Administration and Management in Hong Kong Primary Schools.
Proceedings of the Advances in Web Based Learning, 2006

2005
A cognitive tool for teaching the addition/subtraction of common fractions: a model of affordances.
Comput. Educ., 2005

Automatic Extraction of Learning Object Metadata (LOM) from HTML Web Pages.
Proceedings of the Towards Sustainable and Scalable Educational Innovations Informed by the Learning Sciences, 2005

A cognitive tool in handheld devices for collaborative learning: comprehending procedural knowledge of the addition of common fractions.
Proceedings of the Next 10 Years! Proceedings of the 2005 Conference on Computer Support for Collaborative Learning, 2005

2004
IDS False Alarm Filtering Using KNN Classifier.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Security Modelling for Risk Analysis.
Proceedings of the Security and Protection in Information Processing Systems, 2004

2003
A robust watermarking scheme for 3D triangular mesh models.
Pattern Recognit., 2003

A graphical partitioning model for learning common fraction: designing affordances on a web-supported learning environment.
Comput. Educ., 2003

Robust Watermarking of 3D Polygonal Models Based on Vertice Scrambling.
Proceedings of the 2003 Computer Graphics International (CGI 2003), 2003

Electronic Information Security Documentation.
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003

2002
Modeling the Process of Learning Common Fraction Operation: Designing an Internet-Based Integrated Learning Environment for Knowledge Construction.
Proceedings of the International Conference on Computers in Education, 2002

2001
Integrating security design into the software development process for e-commerce systems.
Inf. Manag. Comput. Secur., 2001

Security Documentation.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001

1999
A conceptual model of knowledge-based time-tabling system.
Knowl. Based Syst., 1999

Information security management and modelling.
Inf. Manag. Comput. Secur., 1999

Evaluating SAMS in Hong Kong schools.
Comput. Educ., 1999

An interactive teaching and learning environment for graph sketching.
Comput. Educ., 1999

1997
Hypertext information security model for organizations.
Inf. Manag. Comput. Secur., 1997

Timetabling in Hong Kong secondary schools.
Comput. Educ., 1997

Code of Practice: A Standard for Information Security Management.
Proceedings of the Information Security in Research and Business, 1997

1996
A security officer's workbench.
Comput. Secur., 1996

An intelligent decision support system for teaching duty assignments.
Proceedings of the Australian New Zealand Conference on Intelligent Information Systems, 1996

1995
Knowledge-based cabin crew pattern generator.
Knowl. Based Syst., 1995

1994
Automated Testing Tool for Natural<sup>®</sup>.
Proceedings of the Software Quality and Productivity: Theory, 1994

Security Modelling for Organisations.
Proceedings of the CCS '94, 1994

1993
New Metrics for Automated Programming Assessment.
Proceedings of the Software Engineering Education, Proceedings of the IFIP WG3.4/SEARCC (SRIG on Education and Training) Working Conference, Hong Kong, 28 September, 1993

1992
Upgrading IT Professionals in Hong Kong.
Proceedings of the Professional Development of Information Technology Professionals, 1992


  Loading...