Ting-Fang Yen

According to our database1, Ting-Fang Yen authored at least 16 papers between 2007 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Deploying Android Security Updates: an Extensive Study Involving Manufacturers, Carriers, and End Users.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2017
Breaking and fixing content-based filtering.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

2016
Case Study: Romance Scams.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Predicting Trends.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Obfuscation in Spam and Scam.
Proceedings of the Understanding Social Engineering Based Scams, 2016

2015
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
An Epidemiological Study of Malware Encounters in a Large Enterprise.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Understanding domain registration abuses.
Comput. Secur., 2012

Revisiting Botnet Models and Their Implications for Takedown Strategies.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Sherlock Holmes and the Case of the Advanced Persistent Threat.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

2010
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

2009
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications.
Proceedings of the Detection of Intrusions and Malware, 2009

2008
Traffic Aggregation for Malware Detection.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
Fast and versatile algorithm for nearest neighbor search based on a lower bound tree.
Pattern Recognit., 2007


  Loading...