The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ming-Yang Su: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ming-Yang Su, Jia-Feng Chang
    An Efficient and Secured Internet Key Exchange Protocol Design. [Citation Graph (0, 0)][DBLP]
    CNSR, 2007, pp:184-192 [Conf]
  2. Gen-Huey Chen, Shien-Ching Hwang, Ming-Yang Su, Dyi-Rong Duh
    A General Broadcasting Scheme for Recursive Networks with Complete Connection. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1998, pp:248-0 [Conf]
  3. Ming-Yang Su, Gen-Huey Chen, Dyi-Rong Duh
    A linear-time algorithm for computing the diameters of the incomplete WK-recursive networks. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1996, pp:90-97 [Conf]
  4. Jang-Ping Sheu, Ming-Yang Su
    A Multicast Algorithm for Hypercube Multiprocessors. [Citation Graph (0, 0)][DBLP]
    ICPP (3), 1992, pp:18-22 [Conf]
  5. Shi-Jinn Horng, Ming-Yang Su, Chao-Yi Wu
    An E-Mail Client Implementation with Spam Filtering and Security Mechanisms. [Citation Graph (0, 0)][DBLP]
    ICWS, 2005, pp:783-784 [Conf]
  6. Min-Yang Su, Gen-Huey Chen, Dyi-Rong Duh
    Broadcasting on Incomplete WK-Recursive Networks. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1996, pp:375-381 [Conf]
  7. Ming-Yang Su, Gen-Huey Chen, Dyi-Rong Duh
    Broadcasting on Incomplete WK-Recursive Networks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1999, v:57, n:3, pp:271-294 [Journal]
  8. Ming-Yang Su, Gen-Huey Chen, Dyi-Rong Duh
    Topological properties of incomplete WK-recursive networks. [Citation Graph (0, 0)][DBLP]
    Networks, 1998, v:32, n:1, pp:23-45 [Journal]
  9. Gen-Huey Chen, Shien-Ching Hwang, Hui-Ling Huang, Ming-Yang Su, Dyi-Rong Duh
    A general broadcasting scheme for recursive networks with complete connection. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 2001, v:27, n:9, pp:1273-1278 [Journal]
  10. Ming-Yang Su, Hui-Ling Huang, Gen-Huey Chen, Dyi-Rong Duh
    Node-disjoint paths in incomplete WK-recursive networks. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 2000, v:26, n:13-14, pp:1925-1944 [Journal]
  11. Ming-Yang Su, Gen-Huey Chen, Dyi-Rong Duh
    A Shortest-Path Routing Algorithm for Incomplete WK-Recursive Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1997, v:8, n:4, pp:367-379 [Journal]

  12. Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  13. Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN. [Citation Graph (, )][DBLP]


  14. A real-time network intrusion detection system based on incremental mining approach. [Citation Graph (, )][DBLP]


  15. Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes. [Citation Graph (, )][DBLP]


  16. Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems. [Citation Graph (, )][DBLP]


  17. Design of an adaptive positioning system based on WiFi radio signals. [Citation Graph (, )][DBLP]


  18. WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. [Citation Graph (, )][DBLP]


  19. A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002