Search the dblp DataBase
Andrew H. Sung :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Andrew H. Sung , Jianyun Xu , Patrick Chavez , Srinivas Mukkamala Static Analyzer of Vicious Executables (SAVE). [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:326-334 [Conf ] Patrick Defibaugh-Chavez , Srinivas Mukkamala , Andrew H. Sung Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense). [Citation Graph (0, 0)][DBLP ] AINA (2), 2006, pp:10-14 [Conf ] Srinivas Mukkamala , K. Yendrapalli , R. B. Basnet , Andrew H. Sung Detecting Coordinated Distributed Multiple Attacks. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:557-562 [Conf ] Andrew H. Sung , Srinivas Mukkamala The Feature Selection and Intrusion Detection Problems. [Citation Graph (0, 0)][DBLP ] ASIAN, 2004, pp:468-482 [Conf ] Jianyun Xu , Andrew H. Sung , Qingzhong Liu Detecting Hidden Information in the Wavelet Domain. [Citation Graph (0, 0)][DBLP ] CISST, 2004, pp:571-577 [Conf ] Jianyun Xu , Andrew H. Sung , Qingzhong Liu Online Fraud Detection System Based on Non-Stationery Anomaly Detection. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:364-370 [Conf ] Mingzhen Wei , Andrew H. Sung , Martha E. Cather A New Domain-Independent Field Matching Algorithm for Large Databases. [Citation Graph (0, 0)][DBLP ] DMIN, 2005, pp:126-131 [Conf ] Andrew Sung , Xiao Qin , Tao Xie 0004 Integrating Security Requirements into Scheduling for Real-Time Applications in Grid Computing. [Citation Graph (0, 0)][DBLP ] GCA, 2005, pp:24-30 [Conf ] Patrick Defibaugh-Chavez , Srinivas Mukkamala , Andrew H. Sung Website Visitor Classification Using Machine Learning. [Citation Graph (0, 0)][DBLP ] HIS, 2004, pp:384-389 [Conf ] Srinivas Mukkamala , Guadelupe I. Janoski , Andrew H. Sung Monitoring System Security Using Neural Networks and Support Vector Machines. [Citation Graph (0, 0)][DBLP ] HIS, 2001, pp:121-137 [Conf ] Srinivas Mukkamala , Andrew H. Sung Performance Based Feature Identification for Intrusion Detection Using Support Vector Machines. [Citation Graph (0, 0)][DBLP ] HIS, 2002, pp:351-364 [Conf ] Srinivas Mukkamala , Andrew H. Sung , Ajith Abraham Distributed Multi-Intelligent Agent Framework for Detection of Stealthy Probes. [Citation Graph (0, 0)][DBLP ] HIS, 2003, pp:779-788 [Conf ] Jianyun Xu , Andrew H. Sung , Patrick Chavez , Srinivas Mukkamala Polymorphic Malicious Executable Scanner by API Sequence Analysis. [Citation Graph (0, 0)][DBLP ] HIS, 2004, pp:378-383 [Conf ] Andrew H. Sung Role of Soft Computing in Internet Security. [Citation Graph (0, 0)][DBLP ] HIS, 2002, pp:8- [Conf ] Srinivas Mukkamala , Qingzhong Liu , Rajeev Veeraghattam , Andrew H. Sung Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data. [Citation Graph (0, 0)][DBLP ] ICAISC, 2006, pp:951-961 [Conf ] Guadalupe I. Janoski , Andrew H. Sung Alternate Methods in Reservoir Simulation. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (2), 2001, pp:253-262 [Conf ] Srinivas Mukkamala , Andrew H. Sung , Ajith Abraham , Vitorino Ramos Intrusion Detection Systems Using Adaptive Regression Splines. [Citation Graph (0, 0)][DBLP ] ICEIS (3), 2004, pp:26-33 [Conf ] Willie Chang , Hamdy S. Soliman , Andrew H. Sung Fingerprint Image Compression by a Natural Clustering Neural Network. [Citation Graph (0, 0)][DBLP ] ICIP (2), 1994, pp:341-345 [Conf ] Tao Xie 0004 , Xiao Qin , Andrew Sung SAREC: A Security-Aware Scheduling Strategy for Real-Time Applications on Clusters. [Citation Graph (0, 0)][DBLP ] ICPP, 2005, pp:5-12 [Conf ] Qingzhong Liu , Andrew H. Sung , Jianyun Xu , Bernardete Ribeiro Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography. [Citation Graph (0, 0)][DBLP ] ICPR (2), 2006, pp:267-270 [Conf ] Jianyun Xu , Andrew H. Sung , Qingzhong Liu Tree Based Behavior Monitoring for Adaptive Fraud Detection. [Citation Graph (0, 0)][DBLP ] ICPR (1), 2006, pp:1208-1211 [Conf ] Srinivas Mukkamala , Andrew H. Sung A Comparative Study of Techniques for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ICTAI, 2003, pp:570-0 [Conf ] Willie Chang , Hamdy S. Soliman , Andrew H. Sung Fingerprint Image Compression by a Clustering Learning Network. [Citation Graph (0, 0)][DBLP ] IEA/AIE, 1994, pp:51-56 [Conf ] Guadalupe I. Janoski , Fansheng Li , Mateusz Pietrzyk , Andrew H. Sung , Shih-Hsien Chang , Reid B. Grigg Advances Reservoir Simulation Using Soft Computing. [Citation Graph (0, 0)][DBLP ] IEA/AIE, 2000, pp:623-628 [Conf ] Hujun Li , Fangsheng Li , Andrew H. Sung , William W. Weiss A Fuzzy Inference Algorithm for Lithology Analysis in Formation Evaluation. [Citation Graph (0, 0)][DBLP ] IEA/AIE, 2000, pp:290-295 [Conf ] Srinivas Mukkamala , Andrew H. Sung Computational Intelligent Techniques for Detecting Denial of Service Attacks. [Citation Graph (0, 0)][DBLP ] IEA/AIE, 2004, pp:616-624 [Conf ] Srinivas Mukkamala , Andrew H. Sung , Ajith Abraham Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. [Citation Graph (0, 0)][DBLP ] IEA/AIE, 2004, pp:633-642 [Conf ] Srinivas Mukkamala , Dennis Xu , Andrew H. Sung Intrusion Detection Based on Behavior Mining and Machine Learning Techniques. [Citation Graph (0, 0)][DBLP ] IEA/AIE, 2006, pp:619-628 [Conf ] Srinivas Mukkamala , Andrew H. Sung A Distributed Agent Based IDS for Stealthy Probe Detection. [Citation Graph (0, 0)][DBLP ] IICAI, 2003, pp:413-422 [Conf ] Jianyun Xu , Andrew H. Sung , Qingzhong Liu , Srinivas Mukkamala Fraud Detection System Based on Behavior Mining and Anomaly Detection. [Citation Graph (0, 0)][DBLP ] IICAI, 2005, pp:3487-3501 [Conf ] Qingzhong Liu , Andrew H. Sung Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images. [Citation Graph (0, 0)][DBLP ] IJCAI, 2007, pp:2808-2813 [Conf ] Mingzhen Wei , Andrew H. Sung , Martha E. Cather Detecting Spatial Outliers Using Bipartite Outlier Detection Methods. [Citation Graph (0, 0)][DBLP ] IKE, 2004, pp:236-244 [Conf ] Tao Xie 0004 , Andrew Sung , Xiao Qin Dynamic Task Scheduling with Security Awareness in Real-Time Systems. [Citation Graph (0, 0)][DBLP ] IPDPS, 2005, pp:- [Conf ] A. Sulaiman , K. Ramamoorthy , Srinivas Mukkamala , Andrew H. Sung Disassembled code analyzer for malware (DCAM). [Citation Graph (0, 0)][DBLP ] IRI, 2005, pp:398-403 [Conf ] Andrew H. Sung , Gopalakrishna Reddy Tadiparthi , Srinivas Mukkamala Defeating the Current Steganalysis Techniques (Robust Steganography). [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:440-444 [Conf ] Jianyun Xu , Andrew H. Sung , Peipei Shi , Qingzhong Liu JPEG Compression Immune Steganography Using Wavelet Transform. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:704-708 [Conf ] Andrew H. Sung , Srinivas Mukkamala Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. [Citation Graph (0, 0)][DBLP ] SAINT, 2003, pp:209-217 [Conf ] Srinivas Mukkamala , Andrew H. Sung A framework for countering denial of service attacks. [Citation Graph (0, 0)][DBLP ] SMC (4), 2004, pp:3273-3278 [Conf ] Srinivas Mukkamala , Andrew H. Sung , Ajith Abraham Hybrid multi-agent framework for detection of stealthy probes. [Citation Graph (0, 0)][DBLP ] Appl. Soft Comput., 2007, v:7, n:3, pp:631-641 [Journal ] Srinivas Mukkamala , Andrew H. Sung , Ajith Abraham , Vitorino Ramos Intrusion Detection Systems Using Adaptive Regression Splines [Citation Graph (0, 0)][DBLP ] CoRR, 2004, v:0, n:, pp:- [Journal ] Catarina Silva , Bernardete Ribeiro , Andrew H. Sung Boosting RVM Classifiers for Large Data Sets. [Citation Graph (0, 0)][DBLP ] ICANNGA (2), 2007, pp:228-237 [Conf ] Mingzhen Wei , Baojun Bai , Andrew H. Sung , Qingzhong Liu , Jiachun Wang , Martha E. Cather Predicting injection profiles using ANFIS. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:20, pp:4445-4461 [Journal ] Qingzhong Liu , Andrew H. Sung , Zhongxue Chen , Jianyun Xu Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 2008, v:41, n:1, pp:56-66 [Journal ] Srinivas Mukkamala , Andrew H. Sung , Ajith Abraham Intrusion detection using an ensemble of intelligent paradigms. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2005, v:28, n:2, pp:167-182 [Journal ] Video Steganalysis Based on the Expanded Markov and Joint Distribution on the Transform Domains Detecting MSU StegoVideo. [Citation Graph (, )][DBLP ] Distance Metric Learning and Support Vector Machines for Classification of Mass Spectrometry Proteomics Data. [Citation Graph (, )][DBLP ] Learning Manifolds for Bankruptcy Analysis. [Citation Graph (, )][DBLP ] Detecting information-hiding in WAV audios. [Citation Graph (, )][DBLP ] Estimating Monthly Production of Oil Wells. [Citation Graph (, )][DBLP ] Knowledge Based Discovery of Phishing Attacks. [Citation Graph (, )][DBLP ] Recursive Feature Addition for Gene Selection. [Citation Graph (, )][DBLP ] Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods. [Citation Graph (, )][DBLP ] Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting. [Citation Graph (, )][DBLP ] Building resilient classifiers for LSB matching steganography. [Citation Graph (, )][DBLP ] Spectrum Steganalysis of WAV Audio Streams. [Citation Graph (, )][DBLP ] Novel stream mining for audio steganalysis. [Citation Graph (, )][DBLP ] Improved detection and evaluation for JPEG steganalysis. [Citation Graph (, )][DBLP ] Gene Selection for Tumor Classification Using Microarray Gene Expression Data. [Citation Graph (, )][DBLP ] Biased Support Vector Machines and Kernel Methods for Intrusion Detection. [Citation Graph (, )][DBLP ] Classification of Mass Spectrometry Data - Using Manifold and Supervised Distance Metric Learning. [Citation Graph (, )][DBLP ] Using Expanded Markov Process and Joint Distribution Features for JPEG Steganalysis. [Citation Graph (, )][DBLP ] Improving database quality through eliminating duplicate records. [Citation Graph (, )][DBLP ] Search in 0.049secs, Finished in 0.052secs