| 國立臺灣科技大學 |
2019 |
Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Graph Edit Distance
|
Chiu, Chiu C.-K.;Chang, H.-H.;Mao, C.-H.;Wei, T.-E. |
| 國立臺灣科技大學 |
2019 |
Identifying HID-based attacks through process event graph using guilt-by-association analysis
|
Huang, C.-Y.;Lee, H.-M.;Wang, J.-C.;Mao, C.-H. |
| 國立臺灣科技大學 |
2019 |
Detection of DNS Tunneling by Feature-Free Mechanism
|
Lai, C.-M.;Huang, B.-C.;Huang, S.-Y.;Mao, C.-H.;Lee, H.-M. |
| 國立臺灣科技大學 |
2019 |
Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural Network
|
Chiu, Chiu C.-K.;Wei, T.-E.;Chang, H.-H.;Mao, C.-H. |
| 臺大學術典藏 |
2018-09-10T09:18:08Z |
Truncated transcripts of nicotinic acetylcholine subunit gene Bdα6 are associated with spinosad resistance in Bactrocera dorsalis
|
JU-CHUN HSU;Vontas, J.;Mao, C.-H.;Geib, S.M.;Wu, W.-J.;Feng, H.-T.;Hsu, J.-C.; Hsu, J.-C.; Feng, H.-T.; Wu, W.-J.; Geib, S.M.; Mao, C.-H.; Vontas, J.; JU-CHUN HSU |
| 國立臺灣科技大學 |
2017 |
GMiner: Rule-Based Fuzzy Clustering for Google Drive Behavioral Type Mining
|
Hsieh, C.-H;Yan, C.-H;Mao, C.-H;Lai, C.-P;Leu, J.-S. |
| 國立臺灣科技大學 |
2017 |
Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation
|
Lee, K.-C;Hsieh, C.-H;Wei, L.-J;Mao, C.-H;Dai, J.-H;Kuang, Y.-T. |
| 國立臺灣科技大學 |
2017 |
Ziffersystem: A novel malware distribution detection system
|
Chuang, T.-H.;Huang, S.-Y.;Mao, C.-H.;Jeng, A.B.;Lee, H.-M. |
| 國立臺灣科技大學 |
2015 |
Sec-Buzzers: A web service for exploring cyber security emerging topics based on social network mining
|
Hsieh, C.-H.;Lai, C.-M.;Lee, K.-C.;Kao, C.-H.;Mao, C.-H.;Dai, J.-H. |
| 國立臺灣科技大學 |
2014 |
Detecting malware in malicious virtual machines using tensor analysis techniques
|
Chang, T.-Y.;Lai, W.-Y.;Hsiang, T.-R.;Mao, C.-H. |
| 國立臺灣科技大學 |
2013 |
Clustering of similar malware behavior via structural host-sequence comparison
|
Wang, H.-T.;Mao, C.-H.;Wei, T.-E.;Lee, H.-M. |
| 國立臺灣科技大學 |
2012 |
Android malware detection via a latent network behavior analysis
|
Wei, T.-E.;Mao, C.-H.;Jeng, A.B.;Lee, H.-M.;Wang, H.-T.;Wu, D.-J. |
| 國立臺灣科技大學 |
2012 |
Real-time fast-flux identification via localized spatial geolocation detection
|
Wang, H.-T.;Mao, C.-H.;Wu, K.-P.;Lee, H.-M. |
| 國立臺灣科技大學 |
2012 |
DroidMat: Android malware detection through manifest and API calls tracing
|
Wu, D.-J.;Mao, C.-H.;Wei, T.-E.;Lee, H.-M.;Wu, K.-P. |
| 國立臺灣科技大學 |
2012 |
RedJsod: A readable javascript obfuscation detector using semantic-based analysis
|
Al-Taharwa, I.A.;Lee, H.-M.;Jeng, A.B.;Wu, K.-P.;Mao, C.-H.;Wei, T.-E.;Chen, S.-M. |
| 國立臺灣科技大學 |
2012 |
An intrinsic graphical signature based on alert correlation analysis for intrusion detection
|
Pao, H.-K.;Mao, C.-H.;Lee, H.-M.;Chen, C.-D.;Faloutsos, C. |
| 國立臺灣科技大學 |
2011 |
WEB MIMICRY ATTACK DETECTION USING HTTP TOKEN CAUSAL CORRELATION
|
Mao, C.H.;Lee, H.M.;Liu, E.S.;Wu, K.P. |
| 國立臺灣科技大學 |
2011 |
Adaptive e-mails intention finding system based on words social networks
|
Mao, C.H.;Lee, H.M.;Yeh, C.F. |
| 國立臺灣科技大學 |
2010 |
An intrinsic graphical signature based on alert correlation analysis for intrusion detection
|
Pao H.-K.; Mao C.-H.; Lee H.-M.; Chen C.-D.; Faloutsos C. |
| 國立臺灣大學 |
2009 |
System Identification of Degrading Hysteresis of Reinforced Concrete Frames
|
Loh, C. H.; Mao, C. H.; Huang, J. R.; Pan, T. C. |
| 國立臺灣科技大學 |
2007 |
Network motif model: An efficient approach for extracting features from relational data
|
Huang C.-W.; Yu C.-C.; Mao C.-H.; Lee H.-M. |
| 國立臺灣科技大學 |
2006 |
Semantic similarity measurement of Chinese financial news titles based on event frame extracting
|
Mao C.-H.; Hung T.-W.; Ho J.-M.; Lee H.-M. |
| 中國文化大學 |
2005 |
An intelligent extracting Web content agent on the Internet
|
Lee, H.M.; Chen, P.J.; Shih, Y.J.; Tsai, Y.C.; Mao, C.H. |