|
Search the dblp DataBase
Ming-Yuh Huang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, Chris Clifton, Tsau Young Lin
Panel on Intrusion Detection. [Citation Graph (0, 0)][DBLP] DBSec, 1999, pp:227-234 [Conf]
- Ming-Yuh Huang
Critical Information Assurance Challenges for Modern Large-Scale Infrastructures. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2005, pp:7-22 [Conf]
- Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Yuh Huang
Intrusion Detection for an On-Going Attack. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
- Deborah A. Frincke, Ming-Yuh Huang
Recent advances in intrusion detection systems. [Citation Graph (0, 0)][DBLP] Computer Networks, 2000, v:34, n:4, pp:541-545 [Journal]
- Ming-Yuh Huang, Robert J. Jasper, Thomas M. Wicks
A large scale distributed intrusion detection framework based on attack strategy analysis. [Citation Graph (0, 0)][DBLP] Computer Networks, 1999, v:31, n:23-24, pp:2465-2475 [Journal]
- Jim Yuill, Shyhtsun Felix Wu, J. Settle, Fengmin Gong, R. Forno, Ming-Yuh Huang, J. Asbery
Intrusion-detection for incident-response, using a military battlefield-intelligence process. [Citation Graph (0, 0)][DBLP] Computer Networks, 2000, v:34, n:4, pp:671-697 [Journal]
Simulating a Multi-domain RFID System for Replacement Part Tracking. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|